Description
A vulnerability was detected in RainyGao DocSys up to 2.02.36. The affected element is an unknown function of the file src/com/DocSystem/mapping/GroupMemberMapper.xml. Performing a manipulation of the argument searchWord results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
2.02.1
2.02.2
2.02.3
2.02.4
2.02.5
2.02.6
2.02.7
2.02.8
2.02.9
2.02.10
2.02.11
2.02.12
2.02.13
2.02.14
2.02.15
2.02.16
2.02.17
2.02.18
2.02.19
2.02.20
2.02.21
2.02.22
2.02.23
2.02.24
2.02.25
2.02.26
2.02.27
2.02.28
2.02.29
2.02.30
2.02.31
2.02.32
2.02.33
2.02.34
2.02.35
2.02.36
Timeline
| 2026-01-09: | Advisory disclosed |
| 2026-01-09: | VulDB entry created |
| 2026-01-22: | VulDB entry last update |
Credits
xkalami (VulDB User)
References
github.com/xkalami-Tta0/CVE/blob/main/DocSys/SQL注入3.md
vuldb.com/?id.340270 (VDB-340270 | RainyGao DocSys GroupMemberMapper.xml sql injection)
vuldb.com/?ctiid.340270 (VDB-340270 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.725373 (Submit #725373 | https://github.com/RainyGao-GitHub/DocSys/releases/tag/DocSys_V2 RainyGao-GitHub 2.02.36 SQL injection)
github.com/xkalami-Tta0/CVE/blob/main/DocSys/SQL注入3.md
github.com/xkalami-Tta0/CVE/blob/main/DocSys/SQL注入3.md