๐Ÿ” CVE Alert

CVE-2026-7060

HIGH 7.3

liyupi yu-picture MyBatis-Plus PictureServiceImpl.java PageRequest sql injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was determined in liyupi yu-picture up to a053632c41340152bf75b66b3c543d129123d8ec. This impacts the function PageRequest of the file yu-picture-backend/src/main/java/com/yupi/yupicturebackend/service/impl/PictureServiceImpl.java of the component MyBatis-Plus. Executing a manipulation of the argument sortField can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. Applying a patch is advised to resolve this issue. The project was informed of the problem early through a pull request but has not reacted yet.

CWE CWE-89 CWE-74
Vendor liyupi
Product yu-picture
Published Apr 26, 2026
Stay Ahead of the Next One

Get instant alerts for liyupi yu-picture

Be the first to know when new high vulnerabilities affecting liyupi yu-picture are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

liyupi / yu-picture
a053632c41340152bf75b66b3c543d129123d8ec

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359633 vuldb.com: https://vuldb.com/vuln/359633/cti vuldb.com: https://vuldb.com/submit/798612 github.com: https://github.com/liyupi/yu-picture/issues/4 github.com: https://github.com/liyupi/yu-picture/pull/3 github.com: https://github.com/liyupi/yu-picture/

Credits

๐Ÿ” anch0r (VulDB User) VulDB CNA Team