Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3287: SQL Injection in youlaitech youlai-mall

0
Medium
VulnerabilityCVE-2026-3287cvecve-2026-3287
Published: Fri Feb 27 2026 (02/27/2026, 04:02:43 UTC)
Source: CVE Database V5
Vendor/Project: youlaitech
Product: youlai-mall

Description

CVE-2026-3287 is a medium severity SQL injection vulnerability found in youlaitech youlai-mall version 2. 0. 0. The flaw exists in the listPagedSpuForApp function of the App-side Product Pagination Endpoint, specifically in the handling of the sortField and sort arguments. An attacker can remotely exploit this vulnerability without authentication or user interaction by manipulating these parameters to inject malicious SQL code. Although the vendor was notified, no patch or response has been provided, and a public exploit is available, increasing the risk of exploitation. The vulnerability can lead to unauthorized data access or modification, impacting confidentiality, integrity, and availability of the affected system. Organizations using this version of youlai-mall should prioritize mitigation to prevent potential attacks. The threat primarily affects deployments of youlai-mall 2. 0.

AI-Powered Analysis

AILast updated: 02/27/2026, 19:27:34 UTC

Technical Analysis

CVE-2026-3287 is a SQL injection vulnerability identified in youlaitech's youlai-mall version 2.0.0, specifically within the listPagedSpuForApp function located in the mall-pms/pms-boot/src/main/java/com/youlai/mall/pms/controller/app/SpuController.java file. The vulnerability arises from improper sanitization of the sortField and sort parameters used for product pagination on the application side. By manipulating these parameters, an attacker can inject arbitrary SQL commands, potentially allowing unauthorized access to or modification of the backend database. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The vendor was contacted early but has not responded or issued a patch, and a public exploit has been released, which could facilitate widespread attacks. The CVSS 4.0 score is 5.3 (medium severity), reflecting the ease of exploitation and moderate impact on confidentiality, integrity, and availability. This vulnerability affects the core e-commerce functionality, potentially exposing sensitive product and user data or enabling further compromise of the system. No mitigations or patches have been officially released, leaving systems vulnerable to exploitation.

Potential Impact

The exploitation of CVE-2026-3287 can lead to unauthorized disclosure, modification, or deletion of sensitive data stored in the youlai-mall backend database. This can compromise customer information, product details, and transactional data, undermining the integrity and confidentiality of the e-commerce platform. Attackers could leverage this vulnerability to escalate privileges, conduct further attacks within the network, or disrupt service availability by corrupting database contents. For organizations relying on youlai-mall 2.0.0, this could result in financial losses, reputational damage, regulatory penalties, and operational disruptions. The availability of a public exploit increases the likelihood of automated attacks and exploitation attempts, especially against unpatched systems. The lack of vendor response and patch availability exacerbates the risk, making timely mitigation critical to prevent data breaches and service interruptions.

Mitigation Recommendations

Organizations using youlai-mall 2.0.0 should immediately implement input validation and sanitization controls on the sortField and sort parameters to prevent SQL injection. Employ parameterized queries or prepared statements in the affected function to ensure user inputs are not directly concatenated into SQL commands. If possible, restrict or whitelist acceptable values for sorting parameters to reduce injection vectors. Monitor application logs and database activity for suspicious queries or anomalies indicative of exploitation attempts. Deploy web application firewalls (WAFs) with rules targeting SQL injection patterns specific to youlai-mall endpoints. Isolate and segment the database to limit the impact of a potential breach. Engage with the vendor or community to obtain patches or updates and plan for an upgrade once available. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. Finally, maintain backups of critical data to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-26T16:46:06.180Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1ec5132ffcdb8a267e1ed

Added to database: 2/27/2026, 7:11:13 PM

Last enriched: 2/27/2026, 7:27:34 PM

Last updated: 2/27/2026, 8:25:41 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses