Description
A security vulnerability has been detected in linlinjava litemall up to 1.8.0. Affected by this vulnerability is the function backup/load of the file litemall-db/src/main/java/org/linlinjava/litemall/db/util/DbUtil.java of the component Database Setting Handler. The manipulation of the argument db/password leads to argument injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-18
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an argument injection flaw in the backup/load function of the Database Setting handler within litemall DbUtil.java. The function improperly accepts and uses the db/password argument without adequate validation, allowing an attacker to craft malicious input that can be injected into the underlying command executed by the system. If exploited, the injection could enable execution of arbitrary commands on the host, yielding remote code execution and full compromise of the affected system’s confidentiality, integrity, and availability.

Affected Systems

linlinjava litemall is affected, specifically all releases up to version 1.8.0. No more granular version data is provided beyond this upper bound, so users of 1.8.0 and earlier should consider themselves vulnerable unless they have applied a later fix.

Risk and Exploitability

With a CVSS score of 5.1 the vulnerability is considered moderate. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, as the backup/load API can be invoked over the network. While no patch is indicated in the provided data, the public disclosure and lack of vendor response raise concern. Organizations must treat this as a potential exploitation risk until a vendor update is released.

Generated by OpenCVE AI on May 18, 2026 at 01:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest litemall release that removes the vulnerable code or includes a patch that sanitizes the db/password input.
  • Restrict access to the backup/load endpoint to a minimal set of privileged users and enforce strong authentication mechanisms.
  • If a patch is not yet available, disable or remove the backup/load functionality from the production environment to eliminate the attack surface.

Generated by OpenCVE AI on May 18, 2026 at 01:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 00:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in linlinjava litemall up to 1.8.0. Affected by this vulnerability is the function backup/load of the file litemall-db/src/main/java/org/linlinjava/litemall/db/util/DbUtil.java of the component Database Setting Handler. The manipulation of the argument db/password leads to argument injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title linlinjava litemall Database Setting DbUtil.java load argument injection
First Time appeared Linlinjava
Linlinjava litemall
Weaknesses CWE-74
CWE-88
CPEs cpe:2.3:a:linlinjava:litemall:*:*:*:*:*:*:*:*
Vendors & Products Linlinjava
Linlinjava litemall
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Linlinjava Litemall
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-18T00:00:13.854Z

Reserved: 2026-05-17T09:36:19.258Z

Link: CVE-2026-8773

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T00:16:37.893

Modified: 2026-05-18T00:16:37.893

Link: CVE-2026-8773

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T02:00:11Z

Weaknesses