CVE-2026-8737
Description
A weakness has been identified in Sanluan PublicCMS 5.202506.d. This issue affects the function execute of the file publiccms-trade/src/main/java/com/publiccms/views/directive/trade/TradeAddressListDirective.java of the component Trade Address Query Handler. Executing a manipulation of the argument userId/id can lead to missing authentication. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PublicCMS 5.202506.d trade address API lacks authentication, allowing unauthenticated attackers to enumerate and retrieve other users' shipping addresses and phone numbers.
Root
Cause
The vulnerability resides in the TradeAddressListDirective and related endpoints within PublicCMS's trade module. These directives inherit from AbstractTemplateDirective but fail to override needAppToken() or needUserToken(), leaving the endpoints accessible without any authentication or authorization checks [1]. As a result, an unauthenticated attacker can query address data belonging to arbitrary users by supplying a userId or address id parameter.
Attack
Vector
The attack is performed remotely by sending crafted GET requests to the following endpoints: - /api/directive/trade/addressList?userId=<target>&pageSize=20 - /api/directive/trade/address?id=<target>
No cookies, session tokens, or authentication headers are required. The server responds with HTTP 200 and returns the full TradeAddress entity, including sensitive fields such as address, addressee, telephone, and userId [1].
Impact
An unauthenticated attacker can enumerate user IDs and retrieve the shipping addresses, recipient names, and phone numbers of any user in the system. This constitutes a severe privacy breach and could be used for targeted phishing, identity theft, or physical harassment. The exploit has been publicly disclosed, increasing the risk of active exploitation [1].
Mitigation
The vendor was contacted but did not respond, and no official patch has been released. Users of PublicCMS 5.202506.d should implement network-level restrictions (e.g., firewall rules) to block external access to the /api/directive/trade/ endpoints, or apply custom authentication logic by overriding the token-check methods in the affected directives [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
1- ZDI-26-295: (0Day) PublicCMS getXml Server-Side Request Forgery Information Disclosure VulnerabilityZero Day Initiative · Apr 21, 2026