The analysis of the vulnerability is based on the detailed information provided in the GitHub issue #2 for the risesoft-y9/Digital-Infrastructure repository. The issue report clearly identifies the root cause of the SQL injection vulnerability within the net.risesoft.util.Y9PlatformUtil.getTenantByLoginName function. The vulnerability stems from the unsafe concatenation of the loginName parameter into a SQL query string. The report also pinpoints the entry point of the vulnerability in the net.risesoft.api.v0.org.AuthenticateApiImpl.authenticate3 function, which takes user input and passes it to the vulnerable function. Although no patch is available, the provided code snippets from the issue serve as strong evidence for identifying the vulnerable functions.