CVE-2026-5148: SQL Injection in YunaiV yudao-cloud
A weakness has been identified in YunaiV yudao-cloud up to 2026.01. This vulnerability affects unknown code of the file /admin-api/system/mail-log/page. This manipulation of the argument toMail causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-5148 is a SQL injection vulnerability identified in the YunaiV yudao-cloud software, specifically affecting version 2026.01 and earlier. The vulnerability resides in the /admin-api/system/mail-log/page endpoint, where the toMail parameter is vulnerable to SQL injection due to insufficient input validation and sanitization. This allows an attacker to craft malicious SQL queries that the backend database executes, potentially leading to unauthorized data access, data modification, or disruption of service. The attack vector is remote network access without requiring user interaction, but it requires the attacker to have high privileges, which suggests that the attacker must already have some level of authenticated access or elevated permissions within the system. The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, no user interaction, and no privileges required for attack initiation, but high privileges required overall. The vendor was contacted early but has not responded or issued a patch, and although a public exploit exists, there are no reports of active exploitation in the wild. The vulnerability could allow attackers to extract sensitive information from the database, modify records, or disrupt application functionality, potentially leading to data breaches or operational impacts.
Potential Impact
The impact of CVE-2026-5148 on organizations using YunaiV yudao-cloud can be significant, especially for those relying on the affected version 2026.01. Successful exploitation could lead to unauthorized disclosure of sensitive data stored in the backend database, including potentially confidential mail logs or user information. Data integrity could also be compromised if attackers modify or delete records, which may disrupt business operations or cause loss of trust. Availability might be affected if the injection leads to database errors or service crashes. Since the vulnerability requires high privileges, the threat is somewhat mitigated against external attackers without credentials, but insider threats or attackers who have compromised accounts could leverage this flaw to escalate their access or exfiltrate data. The lack of vendor response and patch availability increases the risk exposure duration. Organizations in sectors handling sensitive communications or critical infrastructure could face regulatory, reputational, and operational risks if exploited.
Mitigation Recommendations
To mitigate CVE-2026-5148, organizations should first assess their deployment of YunaiV yudao-cloud and identify if they are running the affected version 2026.01. Since no official patch is available, immediate mitigation steps include implementing strict input validation and sanitization on the toMail parameter at the application or web server level, using web application firewalls (WAFs) to detect and block SQL injection attempts targeting the vulnerable endpoint, and restricting access to the /admin-api/system/mail-log/page endpoint to trusted internal networks or authenticated users with minimal privileges. Monitoring logs for unusual SQL query patterns or failed injection attempts can help detect exploitation attempts. Additionally, organizations should enforce the principle of least privilege to limit high privilege accounts and consider network segmentation to reduce exposure. Engaging with the vendor for updates and tracking vulnerability disclosures is critical. In the longer term, migrating to a patched or updated version once available is essential to fully remediate the vulnerability.
Affected Countries
China, United States, Germany, Japan, South Korea, India, United Kingdom, France, Australia, Canada
CVE-2026-5148: SQL Injection in YunaiV yudao-cloud
Description
A weakness has been identified in YunaiV yudao-cloud up to 2026.01. This vulnerability affects unknown code of the file /admin-api/system/mail-log/page. This manipulation of the argument toMail causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5148 is a SQL injection vulnerability identified in the YunaiV yudao-cloud software, specifically affecting version 2026.01 and earlier. The vulnerability resides in the /admin-api/system/mail-log/page endpoint, where the toMail parameter is vulnerable to SQL injection due to insufficient input validation and sanitization. This allows an attacker to craft malicious SQL queries that the backend database executes, potentially leading to unauthorized data access, data modification, or disruption of service. The attack vector is remote network access without requiring user interaction, but it requires the attacker to have high privileges, which suggests that the attacker must already have some level of authenticated access or elevated permissions within the system. The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, no user interaction, and no privileges required for attack initiation, but high privileges required overall. The vendor was contacted early but has not responded or issued a patch, and although a public exploit exists, there are no reports of active exploitation in the wild. The vulnerability could allow attackers to extract sensitive information from the database, modify records, or disrupt application functionality, potentially leading to data breaches or operational impacts.
Potential Impact
The impact of CVE-2026-5148 on organizations using YunaiV yudao-cloud can be significant, especially for those relying on the affected version 2026.01. Successful exploitation could lead to unauthorized disclosure of sensitive data stored in the backend database, including potentially confidential mail logs or user information. Data integrity could also be compromised if attackers modify or delete records, which may disrupt business operations or cause loss of trust. Availability might be affected if the injection leads to database errors or service crashes. Since the vulnerability requires high privileges, the threat is somewhat mitigated against external attackers without credentials, but insider threats or attackers who have compromised accounts could leverage this flaw to escalate their access or exfiltrate data. The lack of vendor response and patch availability increases the risk exposure duration. Organizations in sectors handling sensitive communications or critical infrastructure could face regulatory, reputational, and operational risks if exploited.
Mitigation Recommendations
To mitigate CVE-2026-5148, organizations should first assess their deployment of YunaiV yudao-cloud and identify if they are running the affected version 2026.01. Since no official patch is available, immediate mitigation steps include implementing strict input validation and sanitization on the toMail parameter at the application or web server level, using web application firewalls (WAFs) to detect and block SQL injection attempts targeting the vulnerable endpoint, and restricting access to the /admin-api/system/mail-log/page endpoint to trusted internal networks or authenticated users with minimal privileges. Monitoring logs for unusual SQL query patterns or failed injection attempts can help detect exploitation attempts. Additionally, organizations should enforce the principle of least privilege to limit high privilege accounts and consider network segmentation to reduce exposure. Engaging with the vendor for updates and tracking vulnerability disclosures is critical. In the longer term, migrating to a patched or updated version once available is essential to fully remediate the vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-30T13:23:50.931Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69cad830e6bfc5ba1d66dc10
Added to database: 3/30/2026, 8:08:16 PM
Last enriched: 3/30/2026, 8:23:56 PM
Last updated: 3/30/2026, 9:16:01 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.