The vulnerability stems from improper handling of the sqlWhere parameter in the category list functionality. Evidence from the Gitee issue shows: 1) The attack targets /cms/category/list endpoint 2) SQL injection occurs through sqlWhere parameter manipulation 3) The exploit demonstrates direct SQL function execution (extractvalue/database()). This pattern indicates the controller method responsible for handling this endpoint likely concatenates user input directly into SQL queries without using prepared statements or proper escaping mechanisms. The high confidence comes from the reproducible POC and vendor's confirmation that version 5.2.10 addresses the issue through input validation improvements.