-
CVSS Score
-The vulnerability manifests in the authentication endpoint (/api/signin) where user-controlled input (username) is directly used in SQL queries. While exact code isn't available, the nature of SQLi vulnerabilities and the attack payload example (using username='test' OR ...) strongly indicates unsafe string concatenation in the authentication query logic. Node.js SQL injection patterns typically involve missing parameterized queries in database operations related to user authentication.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| fuxa-server | npm | <= 1.1.12 |
A Semantic Attack on Google Gemini - Read the Latest Research