| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| surrealdb | rust | < 1.1.0 | 1.1.0 |
The vulnerability stemmed from improper header value handling in the HTTP API router. The original code in lib/src/api/engine/remote/http/mod.rs used direct string literals for headers and unwrapped HeaderValue creation. The patch introduced proper header constants (NS/DB from headers module) and error handling. Specifically, vulnerable code patterns like request.header("NS", &ns) were replaced with validated header handling using header(&NS, &ns), preventing panics from invalid header values.
KEV Misses 88% of Exploited CVEs- Get the report