CVE-2026-3287: SQL Injection in youlaitech youlai-mall
A security flaw has been discovered in youlaitech youlai-mall 2.0.0. This affects the function listPagedSpuForApp of the file mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java of the component App-side Product Pagination Endpoint. Performing a manipulation of the argument sortField/sort results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-3287 is a SQL injection vulnerability identified in youlaitech's youlai-mall version 2.0.0, specifically within the listPagedSpuForApp function located in the mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java file. The vulnerability arises from improper sanitization of the sortField and sort parameters used for product pagination on the application side. By manipulating these parameters, an attacker can inject arbitrary SQL commands, potentially allowing unauthorized access to or modification of the backend database. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The vendor was contacted early but has not responded or issued a patch, and a public exploit has been released, which could facilitate widespread attacks. The CVSS 4.0 score is 5.3 (medium severity), reflecting the ease of exploitation and moderate impact on confidentiality, integrity, and availability. This vulnerability affects the core e-commerce functionality, potentially exposing sensitive product and user data or enabling further compromise of the system. No mitigations or patches have been officially released, leaving systems vulnerable to exploitation.
Potential Impact
The exploitation of CVE-2026-3287 can lead to unauthorized disclosure, modification, or deletion of sensitive data stored in the youlai-mall backend database. This can compromise customer information, product details, and transactional data, undermining the integrity and confidentiality of the e-commerce platform. Attackers could leverage this vulnerability to escalate privileges, conduct further attacks within the network, or disrupt service availability by corrupting database contents. For organizations relying on youlai-mall 2.0.0, this could result in financial losses, reputational damage, regulatory penalties, and operational disruptions. The availability of a public exploit increases the likelihood of automated attacks and exploitation attempts, especially against unpatched systems. The lack of vendor response and patch availability exacerbates the risk, making timely mitigation critical to prevent data breaches and service interruptions.
Mitigation Recommendations
Organizations using youlai-mall 2.0.0 should immediately implement input validation and sanitization controls on the sortField and sort parameters to prevent SQL injection. Employ parameterized queries or prepared statements in the affected function to ensure user inputs are not directly concatenated into SQL commands. If possible, restrict or whitelist acceptable values for sorting parameters to reduce injection vectors. Monitor application logs and database activity for suspicious queries or anomalies indicative of exploitation attempts. Deploy web application firewalls (WAFs) with rules targeting SQL injection patterns specific to youlai-mall endpoints. Isolate and segment the database to limit the impact of a potential breach. Engage with the vendor or community to obtain patches or updates and plan for an upgrade once available. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. Finally, maintain backups of critical data to enable recovery in case of compromise.
Affected Countries
China, India, United States, Russia, Brazil, South Korea, Japan, Germany, United Kingdom, France
CVE-2026-3287: SQL Injection in youlaitech youlai-mall
Description
A security flaw has been discovered in youlaitech youlai-mall 2.0.0. This affects the function listPagedSpuForApp of the file mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java of the component App-side Product Pagination Endpoint. Performing a manipulation of the argument sortField/sort results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3287 is a SQL injection vulnerability identified in youlaitech's youlai-mall version 2.0.0, specifically within the listPagedSpuForApp function located in the mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java file. The vulnerability arises from improper sanitization of the sortField and sort parameters used for product pagination on the application side. By manipulating these parameters, an attacker can inject arbitrary SQL commands, potentially allowing unauthorized access to or modification of the backend database. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The vendor was contacted early but has not responded or issued a patch, and a public exploit has been released, which could facilitate widespread attacks. The CVSS 4.0 score is 5.3 (medium severity), reflecting the ease of exploitation and moderate impact on confidentiality, integrity, and availability. This vulnerability affects the core e-commerce functionality, potentially exposing sensitive product and user data or enabling further compromise of the system. No mitigations or patches have been officially released, leaving systems vulnerable to exploitation.
Potential Impact
The exploitation of CVE-2026-3287 can lead to unauthorized disclosure, modification, or deletion of sensitive data stored in the youlai-mall backend database. This can compromise customer information, product details, and transactional data, undermining the integrity and confidentiality of the e-commerce platform. Attackers could leverage this vulnerability to escalate privileges, conduct further attacks within the network, or disrupt service availability by corrupting database contents. For organizations relying on youlai-mall 2.0.0, this could result in financial losses, reputational damage, regulatory penalties, and operational disruptions. The availability of a public exploit increases the likelihood of automated attacks and exploitation attempts, especially against unpatched systems. The lack of vendor response and patch availability exacerbates the risk, making timely mitigation critical to prevent data breaches and service interruptions.
Mitigation Recommendations
Organizations using youlai-mall 2.0.0 should immediately implement input validation and sanitization controls on the sortField and sort parameters to prevent SQL injection. Employ parameterized queries or prepared statements in the affected function to ensure user inputs are not directly concatenated into SQL commands. If possible, restrict or whitelist acceptable values for sorting parameters to reduce injection vectors. Monitor application logs and database activity for suspicious queries or anomalies indicative of exploitation attempts. Deploy web application firewalls (WAFs) with rules targeting SQL injection patterns specific to youlai-mall endpoints. Isolate and segment the database to limit the impact of a potential breach. Engage with the vendor or community to obtain patches or updates and plan for an upgrade once available. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. Finally, maintain backups of critical data to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-26T16:46:06.180Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1ec5132ffcdb8a267e1ed
Added to database: 2/27/2026, 7:11:13 PM
Last enriched: 2/27/2026, 7:27:34 PM
Last updated: 4/12/2026, 1:08:06 PM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.