| Título | YunaiV yudao-cloud <=v2026.01 SQL Injection |
|---|
| Descripción | Yudao-cloud is a background management system implemented based on Spring Cloud Alibaba + MyBatis Plus + Vue & Element. There is a SQL boolean blind injection in the /admin-api/system/tenant/get-by-website. Users can launch attacks on the database without logging in. |
|---|
| Fuente | ⚠️ https://github.com/NarcherAlter/Security_Note/blob/main/Vulnerability_Discovery/yudaoCloudv2026.01.md |
|---|
| Usuario | Narcher (UID 91355) |
|---|
| Sumisión | 2026-03-14 13:17 (hace 17 días) |
|---|
| Moderación | 2026-03-30 15:23 (16 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 354181 [YunaiV yudao-cloud hasta 2026.01 get-by-website Sitio web inyección SQL] |
|---|
| Puntos | 17 |
|---|