Description
A weakness has been identified in linlinjava litemall up to 1.8.0. Affected is an unknown function of the component Admin Endpoint. Executing a manipulation can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-17
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a SQL injection in an unidentified admin function of linlinjava litemall, enabling remote attackers to run arbitrary SQL statements. This could lead to unauthorized data disclosure, tampering, or loss. The flaw is catalogued as CWE-74 and CWE-89, indicating improper neutralization of special elements and classic SQL injection weaknesses.

Affected Systems

linlinjava litemall versions up to 1.8.0 are affected, with multiple admin endpoints vulnerable. The specific function is not named in the advisory, but any exposed admin route may present the flaw.

Risk and Exploitability

The CVSS score of 5.1 denotes a moderate severity. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV registry, though public exploit code exists. Attackers can exploit the vulnerability remotely via malicious requests to the affected admin endpoints, potentially gaining significant database access.

Generated by OpenCVE AI on May 18, 2026 at 01:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade litemall to a version that removes the vulnerable admin endpoint or contains proper input sanitization rules; if no update is immediately available, plan a version migration soon.
  • Implement strict input validation on all admin routes, ensuring only whitelisted characters and structures are accepted and any SQL statement fragments are escaped or parameterized.
  • Restrict access to the admin interface to authorized administrators only, using strong authentication and optionally IP whitelisting or VPN gating to reduce the attack surface.
  • Deploy a Web Application Firewall or intrusion detection system configured with SQL injection detection rules to block malicious payloads before they reach the application.

Generated by OpenCVE AI on May 18, 2026 at 01:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 00:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in linlinjava litemall up to 1.8.0. Affected is an unknown function of the component Admin Endpoint. Executing a manipulation can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way.
Title linlinjava litemall Admin Endpoint sql injection
First Time appeared Linlinjava
Linlinjava litemall
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:linlinjava:litemall:*:*:*:*:*:*:*:*
Vendors & Products Linlinjava
Linlinjava litemall
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Linlinjava Litemall
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-17T23:45:10.800Z

Reserved: 2026-05-17T09:36:16.835Z

Link: CVE-2026-8772

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T00:16:37.720

Modified: 2026-05-18T00:16:37.720

Link: CVE-2026-8772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T02:30:14Z

Weaknesses