CVE-2026-3287: SQL Injection in youlaitech youlai-mall
CVE-2026-3287 is a medium severity SQL injection vulnerability found in youlaitech youlai-mall version 2. 0. 0. The flaw exists in the listPagedSpuForApp function of the App-side Product Pagination Endpoint, specifically in the handling of the sortField and sort arguments. An attacker can remotely exploit this vulnerability without authentication or user interaction by manipulating these parameters to inject malicious SQL code. Although the vendor was notified, no patch or response has been provided, and a public exploit is available, increasing the risk of exploitation. The vulnerability can lead to unauthorized data access or modification, impacting confidentiality, integrity, and availability of the affected system. Organizations using this version of youlai-mall should prioritize mitigation to prevent potential attacks. The threat primarily affects deployments of youlai-mall 2. 0.
AI Analysis
Technical Summary
CVE-2026-3287 is a SQL injection vulnerability identified in youlaitech's youlai-mall version 2.0.0, specifically within the listPagedSpuForApp function located in the mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java file. The vulnerability arises from improper sanitization of the sortField and sort parameters used for product pagination on the application side. By manipulating these parameters, an attacker can inject arbitrary SQL commands, potentially allowing unauthorized access to or modification of the backend database. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The vendor was contacted early but has not responded or issued a patch, and a public exploit has been released, which could facilitate widespread attacks. The CVSS 4.0 score is 5.3 (medium severity), reflecting the ease of exploitation and moderate impact on confidentiality, integrity, and availability. This vulnerability affects the core e-commerce functionality, potentially exposing sensitive product and user data or enabling further compromise of the system. No mitigations or patches have been officially released, leaving systems vulnerable to exploitation.
Potential Impact
The exploitation of CVE-2026-3287 can lead to unauthorized disclosure, modification, or deletion of sensitive data stored in the youlai-mall backend database. This can compromise customer information, product details, and transactional data, undermining the integrity and confidentiality of the e-commerce platform. Attackers could leverage this vulnerability to escalate privileges, conduct further attacks within the network, or disrupt service availability by corrupting database contents. For organizations relying on youlai-mall 2.0.0, this could result in financial losses, reputational damage, regulatory penalties, and operational disruptions. The availability of a public exploit increases the likelihood of automated attacks and exploitation attempts, especially against unpatched systems. The lack of vendor response and patch availability exacerbates the risk, making timely mitigation critical to prevent data breaches and service interruptions.
Mitigation Recommendations
Organizations using youlai-mall 2.0.0 should immediately implement input validation and sanitization controls on the sortField and sort parameters to prevent SQL injection. Employ parameterized queries or prepared statements in the affected function to ensure user inputs are not directly concatenated into SQL commands. If possible, restrict or whitelist acceptable values for sorting parameters to reduce injection vectors. Monitor application logs and database activity for suspicious queries or anomalies indicative of exploitation attempts. Deploy web application firewalls (WAFs) with rules targeting SQL injection patterns specific to youlai-mall endpoints. Isolate and segment the database to limit the impact of a potential breach. Engage with the vendor or community to obtain patches or updates and plan for an upgrade once available. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. Finally, maintain backups of critical data to enable recovery in case of compromise.
Affected Countries
China, India, United States, Russia, Brazil, South Korea, Japan, Germany, United Kingdom, France
CVE-2026-3287: SQL Injection in youlaitech youlai-mall
Description
CVE-2026-3287 is a medium severity SQL injection vulnerability found in youlaitech youlai-mall version 2. 0. 0. The flaw exists in the listPagedSpuForApp function of the App-side Product Pagination Endpoint, specifically in the handling of the sortField and sort arguments. An attacker can remotely exploit this vulnerability without authentication or user interaction by manipulating these parameters to inject malicious SQL code. Although the vendor was notified, no patch or response has been provided, and a public exploit is available, increasing the risk of exploitation. The vulnerability can lead to unauthorized data access or modification, impacting confidentiality, integrity, and availability of the affected system. Organizations using this version of youlai-mall should prioritize mitigation to prevent potential attacks. The threat primarily affects deployments of youlai-mall 2. 0.
AI-Powered Analysis
Technical Analysis
CVE-2026-3287 is a SQL injection vulnerability identified in youlaitech's youlai-mall version 2.0.0, specifically within the listPagedSpuForApp function located in the mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java file. The vulnerability arises from improper sanitization of the sortField and sort parameters used for product pagination on the application side. By manipulating these parameters, an attacker can inject arbitrary SQL commands, potentially allowing unauthorized access to or modification of the backend database. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The vendor was contacted early but has not responded or issued a patch, and a public exploit has been released, which could facilitate widespread attacks. The CVSS 4.0 score is 5.3 (medium severity), reflecting the ease of exploitation and moderate impact on confidentiality, integrity, and availability. This vulnerability affects the core e-commerce functionality, potentially exposing sensitive product and user data or enabling further compromise of the system. No mitigations or patches have been officially released, leaving systems vulnerable to exploitation.
Potential Impact
The exploitation of CVE-2026-3287 can lead to unauthorized disclosure, modification, or deletion of sensitive data stored in the youlai-mall backend database. This can compromise customer information, product details, and transactional data, undermining the integrity and confidentiality of the e-commerce platform. Attackers could leverage this vulnerability to escalate privileges, conduct further attacks within the network, or disrupt service availability by corrupting database contents. For organizations relying on youlai-mall 2.0.0, this could result in financial losses, reputational damage, regulatory penalties, and operational disruptions. The availability of a public exploit increases the likelihood of automated attacks and exploitation attempts, especially against unpatched systems. The lack of vendor response and patch availability exacerbates the risk, making timely mitigation critical to prevent data breaches and service interruptions.
Mitigation Recommendations
Organizations using youlai-mall 2.0.0 should immediately implement input validation and sanitization controls on the sortField and sort parameters to prevent SQL injection. Employ parameterized queries or prepared statements in the affected function to ensure user inputs are not directly concatenated into SQL commands. If possible, restrict or whitelist acceptable values for sorting parameters to reduce injection vectors. Monitor application logs and database activity for suspicious queries or anomalies indicative of exploitation attempts. Deploy web application firewalls (WAFs) with rules targeting SQL injection patterns specific to youlai-mall endpoints. Isolate and segment the database to limit the impact of a potential breach. Engage with the vendor or community to obtain patches or updates and plan for an upgrade once available. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. Finally, maintain backups of critical data to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-26T16:46:06.180Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1ec5132ffcdb8a267e1ed
Added to database: 2/27/2026, 7:11:13 PM
Last enriched: 2/27/2026, 7:27:34 PM
Last updated: 2/27/2026, 8:25:41 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27947: CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Intermesh groupoffice
CriticalCVE-2026-27836: CWE-862: Missing Authorization in thorsten phpMyFAQ
HighCVE-2025-69437: n/a
HighCVE-2026-27832: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Intermesh groupoffice
HighCVE-2026-27824: CWE-307: Improper Restriction of Excessive Authentication Attempts in kovidgoyal calibre
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.