-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| arches | pip | <= 6.1.1 | 6.1.2 |
| arches | pip | = 6.2.0 | 6.2.1 |
| arches | pip | >= 7.0.0, <= 7.1.1 | 7.2.0 |
The commit diff shows critical fixes replacing direct string interpolation with parameterized queries in these functions. GHSL reports explicitly identify these endpoints as vulnerable due to unescaped user input in SQL contexts. The functions handled user-controlled parameters (query, conceptid) without proper sanitization, creating SQL injection vectors. The patches use psycopg2's parameterization (AsIs, %s placeholders) to mitigate these issues.