-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/layer5io/meshery | go | < 0.6.179 | 0.6.179 |
The critical vulnerability stemmed from the GetSystemDatabase handler not sanitizing the 'order' parameter before using it in SQL queries. The patch added 'order = models.SanitizeOrderInput(...)' immediately before query construction, indicating this parameter was previously unsanitized. While other functions used a 'sanitizeOrderInput' function pre-patch, they were at least attempting input validation (though its effectiveness would require deeper analysis). The GetSystemDatabase handler's complete lack of sanitization for this user-controlled parameter made it a clear injection vector.
Ongoing coverage of React2Shell