Impact
The Tiandy Integrated Management Platform version 7.17.0 contains a flaw in the /rest/user/getAuthorityByUserId REST endpoint. Malicious manipulation of the userId parameter can cause an SQL injection, enabling an attacker to execute arbitrary SQL statements against the backend database. This leads to potential data compromise and unauthorized changes to configurations. The weakness is reflected by CWE‑74 and CWE‑89, representing improper input validation and SQL injection.
Affected Systems
The vulnerability is present in the Tiandy Integrated Management Platform on version 7.17.0. No other vendors or products are listed as affected.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, while the EPSS score of less than 1% suggests low exploitation probability across the ecosystem. The vulnerability is not in the CISA KEV catalog, and the vendor has yet to respond with a patch. The likely attack vector is remote, requiring network access to the platform’s REST API and knowledge or guessing of a valid userId value to inject malicious payloads.
OpenCVE Enrichment