VYPR
High severity7.3NVD Advisory· Published May 18, 2026· Updated May 18, 2026

CVE-2026-8771

CVE-2026-8771

Description

A security flaw has been discovered in linlinjava litemall up to 1.8.0. This impacts the function list of the file litemall-wx-api/src/main/java/org/linlinjava/litemall/wx/web/WxGoodsController.java of the component Front-end WeChat API. Performing a manipulation results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A SQL injection vulnerability in litemall ≤1.8.0 allows unauthenticated attackers to execute arbitrary SQL via the /wx/goods/list endpoint.

Vulnerability

Description

A critical SQL injection vulnerability exists in linlinjava litemall up to version 1.8.0, specifically in the front-end WeChat API. The flaw resides in the WxGoodsController.java file, where the sort parameter from the HTTP request is passed directly into the querySelective method of LitemallGoodsService.java. In that service, the sort and order parameters are concatenated into an orderByClause string without any sanitization or whitelist validation. This string is then interpolated directly into the SQL query via ${orderByClause} in the MyBatis mapper XML, leading to SQL injection [1].

Exploitation

The vulnerable endpoint is /wx/goods/list, which is part of the public-facing WeChat API. Unlike previously reported SQL injection issues in litemall (CVE-2024-24323, CVE-2024-46382) that required admin authentication, this vulnerability is accessible to any regular user or even unauthenticated visitors, depending on the Shiro configuration [1]. The sort parameter is attacker-controlled and is not filtered, allowing the injection of arbitrary SQL commands. Public proof-of-concept exploits have been released, demonstrating extraction of sensitive data such as admin password hashes from the database [1].

Impact

Successful exploitation allows an unauthenticated remote attacker to execute arbitrary SQL queries against the underlying MySQL database. This can lead to complete compromise of the application's data, including user credentials, personal information, and administrative secrets. The CVSS score is 8.8 (Critical) due to the low complexity, no required privileges, and high impact on confidentiality, integrity, and availability [1].

Mitigation

The vendor was contacted but did not respond, and no official patch has been released as of the publication date. Users of litemall up to version 1.8.0 are advised to apply input validation and parameterized queries to the affected sort and order parameters, or to restrict access to the /wx/goods/list endpoint until a fix is available. Given the public availability of exploit code, this vulnerability is likely to be actively targeted [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

50