Description
A security flaw has been discovered in youlaitech youlai-mall 2.0.0. This affects the function listPagedSpuForApp of the file mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java of the component App-side Product Pagination Endpoint. Performing a manipulation of the argument sortField/sort results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The web application exposes an SQL injection flaw in the listPagedSpuForApp endpoint of the SpuController, which accepts an unsanitized sortField/sort argument. By injecting SQL through these parameters, an attacker can manipulate the query executed against the backend database, potentially retrieving sensitive data or executing arbitrary SQL statements. The vulnerability is identified as CWE‑74 and CWE‑89 and allows for remote exploitation, meaning an attacker does not need local access to threaten the system. The vendor listed the issue but did not respond to the disclosure, and a public exploit was already released.

Affected Systems

This vulnerability affects the youlaitech youlai‑mall application, specifically version 2.0.0. The associated CPE is cpe:2.3:a:youlai:youlai-mall:2.0.0:*:*:*:*:*:*:* and the affected component is the App‑side Product Pagination Endpoint in SpuController.java.

Risk and Exploitability

The CVSS score is 5.3, indicating moderate severity. EPSS is reported as < 1%, meaning the probability of exploitation is low but non‑zero. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote via manipulation of the sort parameters, and because a public exploit exists, attackers could target any exposed instance of the vulnerable application.

Generated by OpenCVE AI on April 16, 2026 at 15:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an official vendor patch or upgrade to a patched version of youlai‑mall as soon as one is available
  • If an update is not immediately available, enforce strict validation of the sortField/sort parameters by whitelisting accepted values and rejecting anything else
  • Monitor application logs and database activity for signs of attempted injection attempts

Generated by OpenCVE AI on April 16, 2026 at 15:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:youlai:youlai-mall:2.0.0:*:*:*:*:*:*:*

Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Youlai
Youlai youlai-mall
Vendors & Products Youlai
Youlai youlai-mall

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 04:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in youlaitech youlai-mall 2.0.0. This affects the function listPagedSpuForApp of the file mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java of the component App-side Product Pagination Endpoint. Performing a manipulation of the argument sortField/sort results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title youlaitech youlai-mall App-side Product Pagination Endpoint SpuController.java listPagedSpuForApp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Youlai Youlai-mall
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:50:33.929Z

Reserved: 2026-02-26T16:46:06.180Z

Link: CVE-2026-3287

cve-icon Vulnrichment

Updated: 2026-02-27T18:50:30.036Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T05:18:21.190

Modified: 2026-03-02T15:22:38.270

Link: CVE-2026-3287

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:45:16Z

Weaknesses