VYPR
High severityNVD Advisory· Published Feb 23, 2026· Updated Feb 25, 2026

CVE-2025-70058

CVE-2025-70058

Description

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in YMFE yapi v1.12.0. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in the HTTPS agent configuration for Axios requests

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

YMFE yapi v1.12.0 disables TLS certificate validation for Axios requests, making HTTPS connections vulnerable to man-in-the-middle attacks.

Vulnerability

Overview

YMFE yapi v1.12.0 contains an improper certificate validation vulnerability (CWE-295). The application explicitly disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in the HTTPS agent configuration for Axios requests [1]. This configuration is found in the file common/postmanLib.js at line 110 [4].

Exploitation

Scenario

An attacker with network access to the traffic between a yapi instance and any HTTPS-based API it contacts can perform a man-in-the-middle attack. Because the application does not verify the server's TLS certificate, the attacker can present a forged certificate and intercept or modify the communication without detection. No prior authentication or user interaction is required beyond the attacker being positioned on the network path.

Impact

Successful exploitation allows an attacker to eavesdrop on sensitive data transmitted over HTTPS, such as API keys, authentication tokens, or user credentials. The attacker can also inject malicious responses, potentially leading to further compromise of the yapi instance or connected services. This undermines the security guarantees that TLS is meant to provide.

Mitigation

Status

As of the advisory date, no patch has been released for this vulnerability. Users of yapi v1.12.0 are advised to monitor the official GitHub repository [2] for updates. In the interim, administrators can mitigate the risk by deploying network-level controls such as TLS inspection proxies or VPNs to secure the communication paths. The project is open source and maintained by YMFE [3], so a fix may be forthcoming.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
yapi-vendornpm
<= 1.12.0

Affected products

2
  • YMFE/yapidescription
  • Ymfe/Yapillm-fuzzy
    Range: = 1.12.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.