Soumettre #780192: YunaiV yudao-cloud <=v2026.01 SQL Injectioninformation

TitreYunaiV yudao-cloud <=v2026.01 SQL Injection
DescriptionYudao-cloud is a background management system implemented based on Spring Cloud Alibaba + MyBatis Plus + Vue & Element. In the case of yudao-cloud, the vulnerability typically resides in the sorting or filtering parameters of the /admin-api/system/mail-log/page endpoint.An attacker can inject a conditional time-delay payload.
La source⚠️ https://github.com/NarcherAlter/Security_Note/blob/main/Vulnerability_Discovery/yudaoCloudv2026.01.md#
Utilisateur
 Narcher (UID 91355)
Soumission14/03/2026 13:21 (il y a 24 jours)
Modérer30/03/2026 15:23 (16 days later)
StatutAccepté
Entrée VulDB354182 [YunaiV yudao-cloud jusqu’à 2026.01 page toMail injection SQL]
Points18

Do you want to use VulDB in your project?

Use the official API to access entries easily!