-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| topthink/framework | composer | <= 3.2.4 |
The CVE and GHSA explicitly identify parseKey in Mysql.class.php as the root cause. The function's role in processing SQL column names makes it critical for injection prevention. External analysis shows it mishandles user-supplied keys by naively wrapping them in backticks without proper validation, enabling payloads like 'id),(malicious SQL),(username' to break out of column name context. The lack of input filtering for special characters (e.g., parentheses) directly enables SQLi via aggregation methods like count().
A Semantic Attack on Google Gemini - Read the Latest Research