Impact
This vulnerability allows an attacker to inject arbitrary SQL through the toMail argument in the /admin-api/system/mail-log/page endpoint of YunaiV yudao‑cloud. The injection could lead to unauthorized data disclosure, data modification, or other destructive database actions, impacting confidentiality and integrity of the underlying data store. The weakness is classified as CWE‑74 (HTML “String” to HTML conversion) and CWE‑89 (SQL Injection).
Affected Systems
YunaiV yudao‑cloud versions up to 2026.01 are affected. The specific product is the public web application provided by YunaiV; no further sub‑components are listed in public CVE data.
Risk and Exploitability
The CVSS score is 5.1, indicating a medium impact level. The EPSS score is not available, so exploitation probability cannot be quantified. The vulnerability is not in CISA’s KEV catalog. Attackers can trigger the injection remotely, as the vulnerability description explicitly states that the attack can be initiated remotely. No workload or privilege requirements are mentioned, suggesting that the endpoint is reachable from the public network or at least from any authenticated admin session.
OpenCVE Enrichment