CVE-2025-70058
Description
An issue pertaining to CWE-295: Improper Certificate Validation was discovered in YMFE yapi v1.12.0. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in the HTTPS agent configuration for Axios requests
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
YMFE yapi v1.12.0 disables TLS certificate validation for Axios requests, making HTTPS connections vulnerable to man-in-the-middle attacks.
Vulnerability
Overview
YMFE yapi v1.12.0 contains an improper certificate validation vulnerability (CWE-295). The application explicitly disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in the HTTPS agent configuration for Axios requests [1]. This configuration is found in the file common/postmanLib.js at line 110 [4].
Exploitation
Scenario
An attacker with network access to the traffic between a yapi instance and any HTTPS-based API it contacts can perform a man-in-the-middle attack. Because the application does not verify the server's TLS certificate, the attacker can present a forged certificate and intercept or modify the communication without detection. No prior authentication or user interaction is required beyond the attacker being positioned on the network path.
Impact
Successful exploitation allows an attacker to eavesdrop on sensitive data transmitted over HTTPS, such as API keys, authentication tokens, or user credentials. The attacker can also inject malicious responses, potentially leading to further compromise of the yapi instance or connected services. This undermines the security guarantees that TLS is meant to provide.
Mitigation
Status
As of the advisory date, no patch has been released for this vulnerability. Users of yapi v1.12.0 are advised to monitor the official GitHub repository [2] for updates. In the interim, administrators can mitigate the risk by deploying network-level controls such as TLS inspection proxies or VPNs to secure the communication paths. The project is open source and maintained by YMFE [3], so a fix may be forthcoming.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
yapi-vendornpm | <= 1.12.0 | — |
Affected products
2- YMFE/yapidescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.