| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/prest/prest | go | < 1.5.4 | 1.5.4 |
The vulnerability stems from two key issues: 1) JWT bypass via improper whitelist configuration, and 2) SQL injection through unsanitized input. The root cause was identified in the JWT middleware configuration where viperCfg() in config/config.go set a non-regex whitelist path. The commit diff shows the fix adding a regex anchor (^), confirming the vulnerable pattern allowed path manipulation like '/.../auth' to bypass authentication. This bypass enabled access to SQL endpoints where user-controlled URL parameters were directly interpolated into SQL queries without proper sanitization, leading to injection. The explicit whitelist regex fix in the patch directly correlates to the described vulnerability mechanism.
Ongoing coverage of React2Shell