-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the use of fmt.Sprintf in line 79 of id_view.go to build SQL queries. The original code concatenated user-supplied values (params.FilterIDs) directly into the query string via string formatting, creating a classic SQL injection vector. The patch replaced this with parameterized placeholders (? = ?), confirming the vulnerability was caused by unsafe string interpolation in this function. The function's role in processing filter parameters for database queries directly aligns with the described attack vector via the packageID parameter.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/openclarity/kubeclarity/backend | go | < 0.0.0-20240711173334-1d1178840703 | 0.0.0-20240711173334-1d1178840703 |
Ongoing coverage of React2Shell