Impact
A flaw in the database query component of the WeKnora framework allows an attacker to bypass SQL injection protection by exploiting uninspected child nodes in PostgreSQL array and row expressions. This enables smuggling dangerous PostgreSQL functions, chaining them with large object operations and library loading, which in turn grants arbitrary code execution on the database server with the rights of the database user. The weakness is a classic SQL injection flaw, categorized as CWE‑89.
Affected Systems
The vulnerability affects Tencent’s WeKnora, an LLM‑powered document understanding and semantic retrieval platform. All installations running any version earlier than 0.2.12 are susceptible; version 0.2.12 and later contain the fix.
Risk and Exploitability
The issue carries a CVSS score of 10, indicating maximum severity, yet the EPSS score is less than 1%, suggesting low current exploitation probability. It is not listed in the CISA KEV catalog. Attackers could exploit the flaw via unauthenticated access to the application’s query interface; thus the likely vector is remote over the network. Successful exploitation would lead to uncontrolled code execution on the database server, jeopardizing confidentiality, integrity, and availability of all data managed by the system.
OpenCVE Enrichment
Github GHSA