Soumettre #780191: YunaiV yudao-cloud <=v2026.01 SQL Injectioninformation

TitreYunaiV yudao-cloud <=v2026.01 SQL Injection
DescriptionYudao-cloud is a background management system implemented based on Spring Cloud Alibaba + MyBatis Plus + Vue & Element. There is a SQL boolean blind injection in the /admin-api/system/tenant/get-by-website. Users can launch attacks on the database without logging in.
La source⚠️ https://github.com/NarcherAlter/Security_Note/blob/main/Vulnerability_Discovery/yudaoCloudv2026.01.md
Utilisateur
 Narcher (UID 91355)
Soumission14/03/2026 13:17 (il y a 17 jours)
Modérer30/03/2026 15:23 (16 days later)
StatutAccepté
Entrée VulDB354181 [YunaiV yudao-cloud jusqu’à 2026.01 get-by-website Site web injection SQL]
Points17

Want to know what is going to be exploited?

We predict KEV entries!