Description
The Send Basket functionality in Koha Library before 23.05.10 is susceptible to Time-Based SQL Injection because it fails to sanitize the POST parameter bib_list in /cgi-bin/koha/opac-sendbasket.pl, allowing library users to read arbitrary data from the database.
Published: 2026-04-07
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Database Read via SQL Injection
Action: Apply Patch
AI Analysis

Impact

The Koha library system’s Send Basket feature, prior to version 23.05.10, allows a time‑based SQL injection through the POST parameter bib_list sent to /cgi-bin/koha/opac-sendbasket.pl. The code fails to sanitize this input, enabling an attacker to craft queries that return arbitrary database data based on response timing. This flaw can expose catalog contents, user data, or other sensitive information, thereby compromising confidentiality. The underlying weakness is an input validation error that permits SQL query manipulation, identified as an SQL injection vulnerability.

Affected Systems

Koha Library, the open‑source integrated library system widely used by schools and public libraries. All releases before 23.05.10 are affected. The commit log and release notes for 23.05.10 and later indicate that the bib_list input is now properly sanitized, thereby fixing the issue.

Risk and Exploitability

Based on the description, it is inferred that the attack vector is a web‑based SQL injection that does not require authentication, as the Send Basket endpoint accepts unauthenticated POST requests from any user who can access the catalog. The vulnerability’s CVSS score is not present in the data, but the exploit is feasible for anyone able to reach the endpoint. The EPSS score is not provided and the vulnerability is not cataloged by CISA, suggesting that while exploitation is possible, active public attacker activity is not currently documented. Nonetheless, because the flaw exposes arbitrary database content and can be triggered by simple HTTP requests, the potential impact is high and the risk remains significant.

Generated by OpenCVE AI on April 7, 2026 at 22:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Koha to version 23.05.10 or newer, where the bib_list parameter is properly sanitized.

Generated by OpenCVE AI on April 7, 2026 at 22:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Time‑Based SQL Injection in Koha Library's Send Basket Functionality
First Time appeared Koha-community
Koha-community koha
Weaknesses CWE-20
CWE-89
Vendors & Products Koha-community
Koha-community koha

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description The Send Basket functionality in Koha Library before 23.05.10 is susceptible to Time-Based SQL Injection because it fails to sanitize the POST parameter bib_list in /cgi-bin/koha/opac-sendbasket.pl, allowing library users to read arbitrary data from the database.
References

Subscriptions

Koha-community Koha
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-07T15:54:36.430Z

Reserved: 2024-05-19T00:00:00.000Z

Link: CVE-2024-36058

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T17:16:25.050

Modified: 2026-04-08T21:27:00.663

Link: CVE-2024-36058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:50:19Z

Weaknesses