| Titre | YunaiV yudao-cloud <=v2026.01 SQL Injection |
|---|
| Description | Yudao-cloud is a background management system implemented based on Spring Cloud Alibaba + MyBatis Plus + Vue & Element. In the case of yudao-cloud, the vulnerability typically resides in the sorting or filtering parameters of the /admin-api/system/mail-log/page endpoint.An attacker can inject a conditional time-delay payload. |
|---|
| La source | ⚠️ https://github.com/NarcherAlter/Security_Note/blob/main/Vulnerability_Discovery/yudaoCloudv2026.01.md# |
|---|
| Utilisateur | Narcher (UID 91355) |
|---|
| Soumission | 14/03/2026 13:21 (il y a 24 jours) |
|---|
| Modérer | 30/03/2026 15:23 (16 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 354182 [YunaiV yudao-cloud jusqu’à 2026.01 page toMail injection SQL] |
|---|
| Points | 18 |
|---|