Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r78c-v88p-w43h

Опубликовано: 30 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 7.3

Описание

A security flaw has been discovered in YunaiV yudao-cloud up to 2026.01. This affects an unknown part of the file /admin-api/system/tenant/get-by-website. The manipulation of the argument Website results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

A security flaw has been discovered in YunaiV yudao-cloud up to 2026.01. This affects an unknown part of the file /admin-api/system/tenant/get-by-website. The manipulation of the argument Website results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 12%
0.00039
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 7.3
nvd
9 дней назад

A security flaw has been discovered in YunaiV yudao-cloud up to 2026.01. This affects an unknown part of the file /admin-api/system/tenant/get-by-website. The manipulation of the argument Website results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 12%
0.00039
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-74