<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5147 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5147/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 30 Mar 2026 19:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5147/feed.xml" rel="self" type="application/rss+xml"/><item><title>YunaiV yudao-cloud SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-yudao-sql-injection/</link><pubDate>Mon, 30 Mar 2026 19:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-yudao-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-5147) exists in YunaiV yudao-cloud up to version 2026.01 via the Website argument in the /admin-api/system/tenant/get-by-website endpoint, allowing unauthenticated attackers to potentially execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A security flaw, identified as CVE-2026-5147, has been discovered in YunaiV yudao-cloud software, specifically versions up to 2026.01. The vulnerability resides in the <code>/admin-api/system/tenant/get-by-website</code> endpoint, where manipulation of the <code>Website</code> argument can lead to SQL injection. This allows for potential remote exploitation without requiring authentication. The vulnerability was reported to the vendor, but no response or patch has been provided. Publicly available exploit code…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5147</category><category>sql-injection</category><category>web-application</category></item></channel></rss>