Impact
The vulnerability is a SQL injection flaw in the getAdmins function of source-code/src/main/java/com/moke/wp/wx_weimai/controller/admin/Admin_AdminUserController.java in the weimai-wetapp project. Manipulating the keyword argument allows an attacker to inject arbitrary SQL statements, which can lead to data disclosure, credential theft, or unauthorized data modification. This flaw is classified under CWE-74 (SQL Injection) and CWE-89 (Improper Neutralization of Special Elements in SQL Statements).
Affected Systems
The flaw affects the xierongwkhd::weimai-wetapp application up to commit 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. All installations that expose the /admin/getAdmins endpoint without addressing input validation are vulnerable. Because the project follows a rolling release model, no specific patched version is identified, and affected instances may be running any prior release.
Risk and Exploitability
The CVSS v3.1 score is 5.1, indicating medium severity. The EPSS score is reported as less than 1%, suggesting a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. Remote exploitation is possible via HTTP requests that supply a crafted keyword parameter. Based on the description, the attacker does not need elevated privileges to access the endpoint, so the vulnerability can be exploited from a remote location without prior authentication, leading to potential data breach or unauthorized admin actions.
OpenCVE Enrichment