CVE-2026-3957: SQL Injection in xierongwkhd weimai-wetapp
CVE-2026-3957 is a medium-severity SQL injection vulnerability found in the xierongwkhd weimai-wetapp product, specifically in the getLikeMovieList function of HomeController. java. The flaw allows remote attackers to manipulate the 'cat' argument to execute arbitrary SQL commands without authentication or user interaction. Although the product uses a rolling release model making version tracking difficult, the vulnerability affects versions up to commit 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. No patch or vendor response has been published yet, and while an exploit exists, no widespread exploitation has been observed. The vulnerability poses risks to data confidentiality, integrity, and availability due to potential unauthorized data access or modification. Organizations using this software should prioritize code review, input validation, and monitoring to mitigate risks until an official fix is available.
AI Analysis
Technical Summary
CVE-2026-3957 is a SQL injection vulnerability identified in the xierongwkhd weimai-wetapp application, affecting the getLikeMovieList function within the HomeController.java source file. The vulnerability arises from improper sanitization of the 'cat' parameter, which is directly used in SQL queries, enabling attackers to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The product follows a rolling release model, complicating version tracking, but the vulnerability is confirmed up to commit 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. The CVSS 4.0 base score is 5.1 (medium), reflecting network attack vector, low complexity, no privileges or user interaction needed, but limited confidentiality, integrity, and availability impact. No official patch or vendor response has been issued despite early reporting. The exploit code has been published, raising the possibility of future attacks. The vulnerability could allow attackers to extract sensitive data, modify database contents, or disrupt service, depending on the backend database and query context. Given the lack of vendor mitigation, organizations must rely on defensive coding practices and monitoring to reduce exposure.
Potential Impact
The SQL injection vulnerability enables attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data manipulation, or denial of service. Confidentiality is at risk as attackers may extract sensitive user or system data. Integrity can be compromised by unauthorized modification or deletion of database records. Availability may be affected if attackers execute queries that lock tables or cause database crashes. Since exploitation requires no authentication or user interaction and can be performed remotely, the attack surface is broad. Organizations using weimai-wetapp in production environments face risks of data breaches, reputational damage, and operational disruption. The absence of an official patch increases the window of exposure, and published exploit code may facilitate automated attacks. The medium CVSS score reflects moderate impact but does not diminish the importance of timely mitigation, especially in environments handling sensitive or critical data.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict input validation and sanitization on the 'cat' parameter to prevent injection of malicious SQL code. Employ parameterized queries or prepared statements in the application code to separate SQL logic from data inputs. Conduct thorough code reviews focusing on all database interaction points to identify and remediate similar injection risks. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. Monitor application logs and database query logs for suspicious activity indicative of injection attempts. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. Consider isolating the affected service or applying network segmentation to reduce exposure. Engage with the vendor or community to track patch availability and apply updates promptly once released. Additionally, perform penetration testing to validate the effectiveness of mitigations and identify residual risks.
Affected Countries
China, United States, India, Germany, Brazil, Russia, South Korea, Japan, United Kingdom, France
CVE-2026-3957: SQL Injection in xierongwkhd weimai-wetapp
Description
CVE-2026-3957 is a medium-severity SQL injection vulnerability found in the xierongwkhd weimai-wetapp product, specifically in the getLikeMovieList function of HomeController. java. The flaw allows remote attackers to manipulate the 'cat' argument to execute arbitrary SQL commands without authentication or user interaction. Although the product uses a rolling release model making version tracking difficult, the vulnerability affects versions up to commit 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. No patch or vendor response has been published yet, and while an exploit exists, no widespread exploitation has been observed. The vulnerability poses risks to data confidentiality, integrity, and availability due to potential unauthorized data access or modification. Organizations using this software should prioritize code review, input validation, and monitoring to mitigate risks until an official fix is available.
AI-Powered Analysis
Technical Analysis
CVE-2026-3957 is a SQL injection vulnerability identified in the xierongwkhd weimai-wetapp application, affecting the getLikeMovieList function within the HomeController.java source file. The vulnerability arises from improper sanitization of the 'cat' parameter, which is directly used in SQL queries, enabling attackers to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The product follows a rolling release model, complicating version tracking, but the vulnerability is confirmed up to commit 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. The CVSS 4.0 base score is 5.1 (medium), reflecting network attack vector, low complexity, no privileges or user interaction needed, but limited confidentiality, integrity, and availability impact. No official patch or vendor response has been issued despite early reporting. The exploit code has been published, raising the possibility of future attacks. The vulnerability could allow attackers to extract sensitive data, modify database contents, or disrupt service, depending on the backend database and query context. Given the lack of vendor mitigation, organizations must rely on defensive coding practices and monitoring to reduce exposure.
Potential Impact
The SQL injection vulnerability enables attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data manipulation, or denial of service. Confidentiality is at risk as attackers may extract sensitive user or system data. Integrity can be compromised by unauthorized modification or deletion of database records. Availability may be affected if attackers execute queries that lock tables or cause database crashes. Since exploitation requires no authentication or user interaction and can be performed remotely, the attack surface is broad. Organizations using weimai-wetapp in production environments face risks of data breaches, reputational damage, and operational disruption. The absence of an official patch increases the window of exposure, and published exploit code may facilitate automated attacks. The medium CVSS score reflects moderate impact but does not diminish the importance of timely mitigation, especially in environments handling sensitive or critical data.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict input validation and sanitization on the 'cat' parameter to prevent injection of malicious SQL code. Employ parameterized queries or prepared statements in the application code to separate SQL logic from data inputs. Conduct thorough code reviews focusing on all database interaction points to identify and remediate similar injection risks. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. Monitor application logs and database query logs for suspicious activity indicative of injection attempts. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. Consider isolating the affected service or applying network segmentation to reduce exposure. Engage with the vendor or community to track patch availability and apply updates promptly once released. Additionally, perform penetration testing to validate the effectiveness of mitigations and identify residual risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-11T12:33:50.226Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b1db482f860ef9437ae350
Added to database: 3/11/2026, 9:14:48 PM
Last enriched: 3/11/2026, 9:29:06 PM
Last updated: 3/11/2026, 11:48:34 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.