Description
A flaw has been found in Tiandy Easy7 CMS Windows 7.17.0. Impacted is an unknown function of the file /Easy7/apps/WebService/GetDBData.jsp. This manipulation of the argument strTBName causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection enabling data exfiltration or tampering
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in the GetDBData.jsp endpoint of Tiandy Easy7 CMS Windows 7.17.0, where the strTBName parameter is improperly sanitized. An attacker can exploit this flaw by crafting a malicious payload that is injected directly into SQL statements, leading to unauthorized data read, modification, or deletion. The flaw is remote; an attacker only needs to send the exploit over HTTP to the vulnerable web service. Exploitation code is publicly available, indicating that the threat is real and actionable.

Affected Systems

Tiandy Easy7 CMS for Windows, specifically version 7.17.0. No other versions are mentioned in the CNA data. The CPE notation confirms that the issue affects the Windows deployment of the 7.17.0 release.

Risk and Exploitability

The CVSS score of 6.9 classifies this as a medium severity vulnerability, reflecting potential for significant confidentiality impact. EPSS is reported as less than 1%, suggesting a low likelihood of widespread exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog. However, the confirmed remote nature of the attack and the existence of published exploit code mean that the risk to exposed systems remains significant. There is no indication that elevated privileges on the host are required; the primary risk manifests at the database layer.

Generated by OpenCVE AI on April 17, 2026 at 11:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor‑supplied patch or upgrade Tiandy Easy7 CMS to a later version.
  • Limit exposure of the GetDBData.jsp endpoint by configuring firewall rules or network ACLs so that only trusted hosts or a VPN can reach the service.
  • If a patch is not yet available, enforce strict input validation and use parameterized queries in the application code to prevent SQL injection, and consider restricting database privileges for the application user.

Generated by OpenCVE AI on April 17, 2026 at 11:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Tiandy easy7 Cms
CPEs cpe:2.3:a:tiandy:easy7_cms:7.17.0:*:*:*:*:windows:*:*
Vendors & Products Tiandy easy7 Cms

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Tiandy
Tiandy easy7 Cms Windows
Vendors & Products Tiandy
Tiandy easy7 Cms Windows

Mon, 09 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tiandy Easy7 CMS Windows 7.17.0. Impacted is an unknown function of the file /Easy7/apps/WebService/GetDBData.jsp. This manipulation of the argument strTBName causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Tiandy Easy7 CMS Windows GetDBData.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tiandy Easy7 Cms Easy7 Cms Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-09T17:24:59.440Z

Reserved: 2026-03-08T17:41:14.718Z

Link: CVE-2026-3818

cve-icon Vulnrichment

Updated: 2026-03-09T17:24:53.791Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T12:16:12.393

Modified: 2026-03-10T18:45:27.913

Link: CVE-2026-3818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:00:11Z

Weaknesses