Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3957: SQL Injection in xierongwkhd weimai-wetapp

0
Medium
VulnerabilityCVE-2026-3957cvecve-2026-3957
Published: Wed Mar 11 2026 (03/11/2026, 21:02:08 UTC)
Source: CVE Database V5
Vendor/Project: xierongwkhd
Product: weimai-wetapp

Description

CVE-2026-3957 is a medium-severity SQL injection vulnerability found in the xierongwkhd weimai-wetapp product, specifically in the getLikeMovieList function of HomeController. java. The flaw allows remote attackers to manipulate the 'cat' argument to execute arbitrary SQL commands without authentication or user interaction. Although the product uses a rolling release model making version tracking difficult, the vulnerability affects versions up to commit 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. No patch or vendor response has been published yet, and while an exploit exists, no widespread exploitation has been observed. The vulnerability poses risks to data confidentiality, integrity, and availability due to potential unauthorized data access or modification. Organizations using this software should prioritize code review, input validation, and monitoring to mitigate risks until an official fix is available.

AI-Powered Analysis

AILast updated: 03/11/2026, 21:29:06 UTC

Technical Analysis

CVE-2026-3957 is a SQL injection vulnerability identified in the xierongwkhd weimai-wetapp application, affecting the getLikeMovieList function within the HomeController.java source file. The vulnerability arises from improper sanitization of the 'cat' parameter, which is directly used in SQL queries, enabling attackers to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The product follows a rolling release model, complicating version tracking, but the vulnerability is confirmed up to commit 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. The CVSS 4.0 base score is 5.1 (medium), reflecting network attack vector, low complexity, no privileges or user interaction needed, but limited confidentiality, integrity, and availability impact. No official patch or vendor response has been issued despite early reporting. The exploit code has been published, raising the possibility of future attacks. The vulnerability could allow attackers to extract sensitive data, modify database contents, or disrupt service, depending on the backend database and query context. Given the lack of vendor mitigation, organizations must rely on defensive coding practices and monitoring to reduce exposure.

Potential Impact

The SQL injection vulnerability enables attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data manipulation, or denial of service. Confidentiality is at risk as attackers may extract sensitive user or system data. Integrity can be compromised by unauthorized modification or deletion of database records. Availability may be affected if attackers execute queries that lock tables or cause database crashes. Since exploitation requires no authentication or user interaction and can be performed remotely, the attack surface is broad. Organizations using weimai-wetapp in production environments face risks of data breaches, reputational damage, and operational disruption. The absence of an official patch increases the window of exposure, and published exploit code may facilitate automated attacks. The medium CVSS score reflects moderate impact but does not diminish the importance of timely mitigation, especially in environments handling sensitive or critical data.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict input validation and sanitization on the 'cat' parameter to prevent injection of malicious SQL code. Employ parameterized queries or prepared statements in the application code to separate SQL logic from data inputs. Conduct thorough code reviews focusing on all database interaction points to identify and remediate similar injection risks. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. Monitor application logs and database query logs for suspicious activity indicative of injection attempts. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. Consider isolating the affected service or applying network segmentation to reduce exposure. Engage with the vendor or community to track patch availability and apply updates promptly once released. Additionally, perform penetration testing to validate the effectiveness of mitigations and identify residual risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-11T12:33:50.226Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1db482f860ef9437ae350

Added to database: 3/11/2026, 9:14:48 PM

Last enriched: 3/11/2026, 9:29:06 PM

Last updated: 3/11/2026, 11:48:34 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses