Description
A flaw has been found in risesoft-y9 Digital-Infrastructure up to 9.6.7. This affects an unknown function of the file source-code/src/main/java/net/risesoft/util/Y9PlatformUtil.java of the component REST Authenticate Endpoint. Executing a manipulation can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-01-17
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a SQL injection flaw in the REST authentication endpoint of the risesoft‑y9 Digital‑Infrastructure component, specifically in Y9PlatformUtil.java. It allows attackers to inject arbitrary SQL during remote authentication requests, potentially leading to data disclosure or unauthorized data manipulation. The weakness is classified under CWE‑74 and CWE‑89, exposing confidentiality and integrity of database contents.

Affected Systems

Affected vendors/products include risesoft‑y9’s Digital‑Infrastructure, versions up to and including 9.6.7. No specific sub‑version enumeration is provided beyond the maximum affected version; any release 9.6.7 or earlier is vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. EPSS is below 1 % yet an exploit has been published, implying that while low probability of mass exploitation remains, the vulnerability can be leveraged remotely by sending crafted authentication requests. Monitor for unauthenticated or suspicious POST requests to the authentication endpoint, as exploitation requires no prior credentials.

Generated by OpenCVE AI on April 18, 2026 at 05:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched release of the Digital‑Infrastructure component that resolves the SQL injection in Y9PlatformUtil.java.
  • If an upgrade is not immediately possible, restrict network access to the REST authentication endpoint to trusted networks only to limit exposure.
  • Implement input validation or use parameterized queries in the authentication logic to prevent raw SQL construction, directly addressing the CWE‑74/CWE‑89 weakness.

Generated by OpenCVE AI on April 18, 2026 at 05:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vhcx-7rpg-hp39 risesoft-y9 Digital-Infrastructure has a SQL injection vulnerability
History

Mon, 23 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
References

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Risesoft-y9
Risesoft-y9 digital-infrastructure
Vendors & Products Risesoft-y9
Risesoft-y9 digital-infrastructure

Sat, 17 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in risesoft-y9 Digital-Infrastructure up to 9.6.7. This affects an unknown function of the file source-code/src/main/java/net/risesoft/util/Y9PlatformUtil.java of the component REST Authenticate Endpoint. Executing a manipulation can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title risesoft-y9 Digital-Infrastructure REST Authenticate Endpoint Y9PlatformUtil.java sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Risesoft-y9 Digital-infrastructure
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-26T15:56:28.394Z

Reserved: 2026-01-16T16:43:18.763Z

Link: CVE-2026-1050

cve-icon Vulnrichment

Updated: 2026-01-20T21:36:20.934Z

cve-icon NVD

Status : Deferred

Published: 2026-01-17T18:15:48.917

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1050

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:45:38Z

Weaknesses