SQL Injection Vulnerability in Risesoft-y9 Digital-Infrastructure REST Authenticate Endpoint
CVE-2026-1050
Key Information:
- Vendor
Risesoft-y9
- Status
- Vendor
- CVE Published:
- 17 January 2026
Badges
What is CVE-2026-1050?
A vulnerability has been identified in the Risesoft-y9 Digital-Infrastructure, specifically within the REST Authenticate Endpoint. This issue lies in the Y9PlatformUtil.java file and allows for SQL injection attacks. The flaw can be exploited remotely, making it a significant security concern. Despite reporting the issue, there has been no official response from the project's maintainers, and the exploit has been made public, increasing the risk of attack. Organizations utilizing affected versions should prioritize patching to mitigate potential damage.
Affected Version(s)
Digital-Infrastructure 9.6.0
Digital-Infrastructure 9.6.1
Digital-Infrastructure 9.6.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
