SQL Injection Vulnerability in YunaiV yudao-cloud
CVE-2026-5147

6.9MEDIUM

Key Information:

Vendor

Yunaiv

Vendor
CVE Published:
30 March 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-5147?

A security vulnerability exists in YunaiV's yudao-cloud software that allows for SQL injection through manipulation of the 'website' parameter in the /admin-api/system/tenant/get-by-website endpoint. This flaw can be exploited remotely, enabling attackers to gain unauthorized access to the database and execute arbitrary SQL commands. Although the vendor was alerted about this issue, they have yet to respond, amplifying concerns among users and administrators. It's crucial for organizations using affected versions to apply security patches and review their configurations to mitigate potential threats.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

yudao-cloud 2026.01

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Narcher (VulDB User)
VulDB
.