-
CVSS Score
-The vulnerability stemmed from unsanitized user input being concatenated into SQL queries in the getUserAuth method. The patch added input sanitization via dataSanitizer and modified queries to use sanitized values. The original vulnerable pattern (string interpolation of raw inputs in SQL contexts) is a textbook SQL injection flaw (CWE-89). The commit message explicitly references fixing SQL injection in this method, confirming the location.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| nilsteampassnet/teampass | composer | < 3.0.0.22 | 3.0.0.22 |
A Semantic Attack on Google Gemini - Read the Latest Research