VYPR
Medium severity6.5NVD Advisory· Published May 13, 2026· Updated May 13, 2026

CVE-2026-37428

CVE-2026-37428

Description

qihang-wms commit 75c15a was discovered to contain a SQL injection vulnerability via the datascope parameter in the SysDeptMapper.xml file. This vulnerability allows attackers to access sensitive database information, including users' Personally Identifiable Information (PII).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in qihang-wms SysDeptMapper allows attackers to extract sensitive database information including user PII.

Vulnerability

Details

CVE-2026-37428 is a SQL injection vulnerability in the qihang-wms (启航电商WMS) application, specifically in the SysDeptMapper.xml file. The root cause is the use of ${param.dataScope} in a MyBatis mapper, which directly interpolates user-supplied input into SQL queries without proper sanitization or parameterization [1][2]. This allows an attacker to inject arbitrary SQL commands through the datascope parameter.

Exploitation

The vulnerability is triggered via an HTTP GET request to the /prod-api/system/role/list endpoint, where the params[dataScope] parameter is passed with malicious SQL payloads [2]. The attacker must be authenticated, as evidenced by the required Bearer token in the Authorization header [2]. The injection is blind Boolean-based, enabling the attacker to infer database contents by observing response differences.

Impact

Successful exploitation grants the attacker the ability to extract sensitive information from the database, including user Personally Identifiable Information (PII), account credentials, and transaction data [1][2]. The attacker may also escalate privileges to DBA level, potentially compromising the entire database server.

Mitigation

As of the publication date, no official patch has been released for this vulnerability. The affected commit is 75c15a, and users are advised to apply input validation and use parameterized queries to mitigate the risk. The vendor's website is qihangerp.cn [2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.