-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from two key elements: 1) The sqlRunner method that executed raw SQL without applying row-level security filters from Cube's modeling layer. 2) The POST /v1/sql-runner endpoint that exposed this functionality to authenticated users. The security bypass is evident in the commit f1140de which completely removed these components, and the vulnerability description explicitly states this endpoint bypassed security contexts. The diff shows removal of both the route registration and sqlRunner method implementation, confirming their role in the vulnerability.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @cubejs-backend/api-gateway | npm | = 0.31.23 | 0.31.24 |
Ongoing coverage of React2Shell