Impact
The vulnerability is a SQL injection in the query string search API (q=). Attackers can craft malicious input that is interpolated directly into PostgreSQL SELECT statements, enabling arbitrary data access, modification, or denial of service. The weakness corresponds to CWE‑89.
Affected Systems
Alerta monitoring tool, specifically the alerta-server component, is affected across all releases prior to version 9.1.0. The product is produced by the Alerta project and is identified by the CPE cpe:2.3:a:alerta_project:alerta.*. Any deployment using a version older than 9.1.0 is vulnerable.
Risk and Exploitability
The flaw carries a CVSS score of 6.9 and an EPSS score of less than 1%, indicating low current exploitation likelihood, and it is not listed in the CISA KEV catalog. The most likely attack vector is through the exposed HTTP API endpoint that accepts the q= parameter; exploitation requires the ability to send crafted queries, which is possible if the API is reachable.
OpenCVE Enrichment
Github GHSA