Impact
A vulnerability in YunaiV yudao-cloud allows attackers to manipulate the 'Website' parameter in the /admin-api/system/tenant/get-by-website endpoint, leading to arbitrary SQL code execution. The flaw can be exploited remotely, enabling attackers to read, modify, or delete data stored in the database. Because the code injection is not sanitized, it can expose sensitive information or compromise internal data integrity.
Affected Systems
Affected systems are instances of YunaiV yudao-cloud running versions up to 2026.01. The vulnerability exists in an unspecified component of /admin-api/system/tenant/get-by-website, which is part of the admin API. Users of any unpatched version within that range are at risk. No other products or versions were listed.
Risk and Exploitability
The CVSS score is 6.9, indicating a medium to high severity. EPSS is not available, but the exploit has been released publicly and can be conducted over the network. The vulnerability is not currently cataloged in the CISA KEV list, yet it remains a significant risk. Attackers can send crafted requests to the vulnerable endpoint from any network location that can reach the API, making the attack vector remote and straightforward.
OpenCVE Enrichment