Description
A vulnerability was determined in Tiandy Integrated Management Platform 7.17.0. Affected by this issue is some unknown functionality of the file /rest/user/getAuthorityByUserId. Executing a manipulation of the argument userId can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-16
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection that allows attackers to read and modify database contents
Action: Assess Impact
AI Analysis

Impact

The Tiandy Integrated Management Platform version 7.17.0 contains a flaw in the /rest/user/getAuthorityByUserId REST endpoint. Malicious manipulation of the userId parameter can cause an SQL injection, enabling an attacker to execute arbitrary SQL statements against the backend database. This leads to potential data compromise and unauthorized changes to configurations. The weakness is reflected by CWE‑74 and CWE‑89, representing improper input validation and SQL injection.

Affected Systems

The vulnerability is present in the Tiandy Integrated Management Platform on version 7.17.0. No other vendors or products are listed as affected.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, while the EPSS score of less than 1% suggests low exploitation probability across the ecosystem. The vulnerability is not in the CISA KEV catalog, and the vendor has yet to respond with a patch. The likely attack vector is remote, requiring network access to the platform’s REST API and knowledge or guessing of a valid userId value to inject malicious payloads.

Generated by OpenCVE AI on March 22, 2026 at 15:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the current version of Tiandy Integrated Management Platform; check the vendor’s website for any patch or advisory for version 7.17.0.
  • Limit exposure of the /rest/user/getAuthorityByUserId endpoint by restricting network access to trusted hosts or subnets.
  • Monitor application and network logs for unusual request patterns indicating SQL injection attempts.
  • Apply general security hardening measures, such as keeping all software up to date and following secure coding practices for input validation.

Generated by OpenCVE AI on March 22, 2026 at 15:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Tiandy
Tiandy integrated Management Platform
Vendors & Products Tiandy
Tiandy integrated Management Platform

Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tiandy Integrated Management Platform 7.17.0. Affected by this issue is some unknown functionality of the file /rest/user/getAuthorityByUserId. Executing a manipulation of the argument userId can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Tiandy Integrated Management Platform getAuthorityByUserId sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tiandy Integrated Management Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T16:18:19.546Z

Reserved: 2026-03-15T18:46:38.395Z

Link: CVE-2026-4232

cve-icon Vulnrichment

Updated: 2026-03-16T16:18:12.586Z

cve-icon NVD

Status : Deferred

Published: 2026-03-16T14:20:17.000

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-4232

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T08:00:32Z

Weaknesses