Cyber Posture

CVE-2026-7727

High

Published: 04 May 2026

Published
04 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0003 8.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability was determined in Shandong Hoteam Software PDM Product Data Management System up to 8.3.9. This affects the function GetQueryMachineGridOnePageData of the file /Base/BaseService.asmx/DataService. This manipulation of the argument SortOrder causes sql injection. The attack can be initiated remotely.…

more

Upgrading to version 8.3.10 is able to mitigate this issue. You should upgrade the affected component.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection attacks by validating untrusted inputs like the SortOrder parameter in the vulnerable GetQueryMachineGridOnePageData function.

prevent

Mandates timely identification, reporting, and correction of flaws such as this SQL injection vulnerability through patching to version 8.3.10.

preventdetect

Requires scanning for vulnerabilities like CVE-2026-7727 and remediation within defined timeframes to address the SQL injection flaw.

Security SummaryAI

CVE-2026-7727 is a SQL injection vulnerability (CWE-74, CWE-89) affecting Shandong Hoteam Software PDM Product Data Management System versions up to 8.3.9. The flaw exists in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, where manipulation of the SortOrder argument enables SQL injection. Published on 2026-05-04, it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).

The vulnerability is remotely exploitable by unauthenticated attackers requiring low complexity and no user interaction. Exploitation via the SortOrder parameter allows limited impacts on confidentiality, integrity, and availability through SQL injection, potentially enabling unauthorized data access, modification, or disruption within the affected PDM system.

Advisories recommend upgrading to version 8.3.10 to mitigate the issue, as this update addresses the vulnerable component. Further details are available from vendor resources at https://en.hoteamsoft.com/pdm and VulDB entries including https://vuldb.com/vuln/360902.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in unauthenticated public-facing ASP.NET web service (/Base/BaseService.asmx) directly enables remote exploitation of T1190; limited C/I/A impacts do not map to additional techniques such as RCE or specific post-exploitation collection.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References