-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The pre-patch code used $pearDB->query("SELECT ... '" . $cg_id . "' ...") which concatenates untrusted input into an SQL string. This pattern is a textbook SQL injection vulnerability as it allows attackers to manipulate the cg_id parameter to inject arbitrary SQL. The fix replaced this with a prepared statement using bindValue(), confirming the vulnerability stemmed from unsafe query construction via PDO::query() with raw user input.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| centreon/centreon | composer | < 22.10.0-beta1 | 22.10.0-beta1 |
Ongoing coverage of React2Shell