VYPR
Medium severity5.3NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2026-8737

CVE-2026-8737

Description

A weakness has been identified in Sanluan PublicCMS 5.202506.d. This issue affects the function execute of the file publiccms-trade/src/main/java/com/publiccms/views/directive/trade/TradeAddressListDirective.java of the component Trade Address Query Handler. Executing a manipulation of the argument userId/id can lead to missing authentication. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

PublicCMS 5.202506.d trade address API lacks authentication, allowing unauthenticated attackers to enumerate and retrieve other users' shipping addresses and phone numbers.

Root

Cause

The vulnerability resides in the TradeAddressListDirective and related endpoints within PublicCMS's trade module. These directives inherit from AbstractTemplateDirective but fail to override needAppToken() or needUserToken(), leaving the endpoints accessible without any authentication or authorization checks [1]. As a result, an unauthenticated attacker can query address data belonging to arbitrary users by supplying a userId or address id parameter.

Attack

Vector

The attack is performed remotely by sending crafted GET requests to the following endpoints: - /api/directive/trade/addressList?userId=<target>&pageSize=20 - /api/directive/trade/address?id=<target>

No cookies, session tokens, or authentication headers are required. The server responds with HTTP 200 and returns the full TradeAddress entity, including sensitive fields such as address, addressee, telephone, and userId [1].

Impact

An unauthenticated attacker can enumerate user IDs and retrieve the shipping addresses, recipient names, and phone numbers of any user in the system. This constitutes a severe privacy breach and could be used for targeted phishing, identity theft, or physical harassment. The exploit has been publicly disclosed, increasing the risk of active exploitation [1].

Mitigation

The vendor was contacted but did not respond, and no official patch has been released. Users of PublicCMS 5.202506.d should implement network-level restrictions (e.g., firewall rules) to block external access to the /api/directive/trade/ endpoints, or apply custom authentication logic by overriding the token-check methods in the affected directives [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Sanluan/Publiccmsinferred2 versions
    = 5.202506.d+ 1 more
    • (no CPE)range: = 5.202506.d
    • (no CPE)range: = 5.202506.d

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1