CVE-2026-34400
🟠 Łataj w tym tygodniu
Wstrzyknięcie SQL w Alerta umożliwia atakującym manipulację zapytaniami do bazy danych.
CVSS
9.8
EPSS
0.0%
Exploit
none
Vendor
alerta_project
Opis źródłowy (NVD)
Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API (q=) was vulnerable to SQL injection via the Postgres query parser, which built WHERE clauses by interpolating user-supplied search terms directly into SQL strings via f-strings. This issue has been patched in version 9.1.0.
sql-injection
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-03-31 22:16:18 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-10 01:41:30 UTC |
Referencje
- https://github.com/alerta/alerta/commit/aeba85a37a09e5769a7a2da56481aa979ff99a00 (security-advisories@github.com) [Patch]
- https://github.com/alerta/alerta/commit/fdd52cd1abad8d02d1dfb8ecdcdbb43b6af3b883 (security-advisories@github.com) [Patch]
- https://github.com/alerta/alerta/pull/2040 (security-advisories@github.com) [Issue Tracking, Patch]
- https://github.com/alerta/alerta/pull/712 (security-advisories@github.com) [Issue Tracking, Patch]
- https://github.com/alerta/alerta/releases/tag/v9.1.0 (security-advisories@github.com) [Product, Release Notes]
- https://github.com/alerta/alerta/security/advisories/GHSA-8prr-286p-4w7j (security-advisories@github.com) [Vendor Advisory]