{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2682","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-18T13:36:24.335Z","datePublished":"2026-02-18T22:32:08.536Z","dateUpdated":"2026-02-23T10:25:54.393Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:25:54.393Z"},"title":"Tsinghua Unigroup Electronic Archives System prinReport.html sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Tsinghua Unigroup","product":"Electronic Archives System","versions":[{"version":"3.2.210802(62532)","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(62532). Impacted is an unknown function of the file /mine/PublicReport/prinReport.html?token=java. Such manipulation of the argument comid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-18T14:41:30.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"lanmeik (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346473","name":"VDB-346473 | Tsinghua Unigroup Electronic Archives System prinReport.html sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346473","name":"VDB-346473 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.753308","name":"Submit #753308 | Tsinghua Unigroup Electronic Archives System  Versions 1 Total 3.2.210802(62532)  SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/luoye197-prog/cve-ziguang-sql/blob/main/introduce","tags":["related"]},{"url":"https://github.com/luoye197-prog/cve-ziguang-sql/blob/main/poc.py","tags":["broken-link","exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-19T16:10:55.363906Z","id":"CVE-2026-2682","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-19T16:11:57.633Z"}}]}}