WhisperX tag archive

#CWE-89

This page collects WhisperX intelligence signals tagged #CWE-89. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (11)

The Network · 2026-03-06 05:13:06 · ai

1. 🔒 SQL Injection Vulnerability Identified in RailsGoat Demo Repository

A critical SQL injection vulnerability has been identified in the `arubis/railsgoat-vulnerability-demo` repository on GitHub. The vulnerability is classified as CWE-89 (SQL Injection) and maps to OWASP A03:2021 (Injection). The security scanner RSOLV reported the issue with 80% confidence. The specific vulnerability is...

The Lab · 2026-03-25 15:27:35 · GitHub Issues

2. Critical SQL Injection Vulnerability Exposed in Ruby on Rails Controller

A critical SQL injection vulnerability has been identified within a Ruby on Rails application, exposing a direct path for attackers to execute arbitrary database commands. The flaw resides in a single line of code within the `app/controllers/users_controller.rb` file, where user input is unsafely concatenated into an S...

The Lab · 2026-03-26 15:27:16 · GitHub Issues

3. GitHub Copilot Flags SQL Injection Risk in Python Code (bad/libuser.py)

A GitHub Copilot security scan has flagged a potential SQL injection vulnerability in a Python codebase, specifically within a user authentication module. The automated finding, classified with a MEDIUM severity rating, points to a direct string interpolation pattern in an SQL command, a classic vector for injection at...

The Lab · 2026-03-26 15:27:18 · GitHub Issues

4. GitHub Copilot Flags SQL Injection Risk in Python Database Initialization Code

A GitHub Copilot security scan has flagged a potential SQL injection vulnerability in a Python database initialization script. The automated tool identified a direct string concatenation for an SQL query in the `bad/db_init.py` file, triggering a MEDIUM severity alert under the CWE-89 classification for improper neutra...

The Lab · 2026-03-30 05:26:50 · GitHub Issues

5. Drizzle ORM 0.45.2 Patches Critical SQL Injection Vulnerability (CWE-89)

A critical security vulnerability has been patched in the widely-used Drizzle ORM library. The patch, released in version 0.45.2, addresses a SQL Injection flaw (CWE-89) within the `sql.identifier()` and `sql.as()` functions. The vulnerability stemmed from improper escaping of values passed to these functions, creating...

The Lab · 2026-04-07 20:27:17 · GitHub Issues

6. Critical SQL Injection Flaw in Healthcare Provider Authentication Exposed Patient Data Risk

A critical SQL injection vulnerability (CWE-89) was discovered in the core authentication function for a healthcare provider system, posing a severe risk of unauthorized access and data manipulation. The flaw, rated a CVSS 3.1 score of 9.8, resided in the `authenticate_user` function within `src/auth/login.py`. Attacke...

The Lab · 2026-04-08 00:26:52 · GitHub Issues

7. Critical SQL Injection in Healthcare Provider Authentication Exposes All Patient Records

A critical SQL injection vulnerability in a healthcare provider authentication system allowed attackers to bypass login entirely and execute arbitrary SQL commands, potentially exposing all patient records across all facilities. The flaw, rated a maximum severity 9.8 on the CVSS scale, was found in the `authenticate_us...

The Lab · 2026-04-16 02:22:32 · GitHub Issues

8. Apache Superset 代码库发现 13 处潜在 SQL 注入漏洞,涉及核心数据库引擎模块

Apache Superset 开源商业智能平台在其代码库中被发现存在多处潜在的 SQL 注入攻击向量。安全扫描工具 Bandit 识别出 13 个位置存在通过字符串拼接方式构造 SQL 查询的风险,这些漏洞被归类为 CWE-89 类型,安全评级为“中危”。 受影响的代码位置分布在多个核心数据库引擎模块和工具文件中,包括 `gsheets.py`、`postgres.py`、`redshift.py` 等数据库连接器,以及用于数据迁移和加密的实用程序文件。这表明风险并非孤立存在,而是可能影响与 Google Sheets、PostgreSQL 和 Amazon Redshift 等多种数据源交互的关键功能。漏洞的根本原因在于直接使...

The Lab · 2026-04-24 13:54:08 · GitHub Issues

9. High-Severity SQL Injection Flaw Exposes Student Database in Flask Application Route

A critical SQL injection vulnerability has been identified in the route handler logic of a Flask-based web application, exposing the system to potential unauthorized database manipulation. The flaw, classified under CWE-89, exists within the search functionality where user-supplied input flows directly into raw SQL que...

The Lab · 2026-05-05 21:31:38 · GitHub Issues

10. Drizzle ORM Users Under Pressure: SQL Injection Flaw Patched After 7-Month Window

A critical SQL injection vulnerability (CWE-89) in the drizzle-orm library went unpatched for an extended period before being addressed in version 0.45.2, raising questions about exposure in production systems that have not yet updated. The flaw resided in the `sql.identifier()` and `sql.as()` functions, where input va...

The Lab · 2026-05-07 19:31:40 · GitHub Issues

11. LightRAG OpenSearch Backend Exposed to Wildcard DoS via Unsanitized Search Input (CWE-89)

A security researcher has identified and patched a vulnerability in LightRAG's OpenSearch integration that allows authenticated users to trigger denial-of-service conditions by injecting pathological wildcard patterns into search queries. The flaw, traced to improper input handling in `lightrag/kg/opensearch_impl.py`, ...