Impact
The vulnerability exists in CodeGenieApp serverless‑express up to version 4.17.1, in an undefined portion of the file utils/dynamodb.ts that implements the Users Endpoint. By manipulating the query filter argument an attacker can inject arbitrary content into the DynamoDB query, resulting in unintended data retrieval or modification. This is an injection weakness that aligns with CWE‑74 (Improper Filtering of Input) and CWE‑707 (Improper Validation or Sanitization). The effect is the potential compromise of confidentiality and integrity of stored data, and may assist in carrying out further attacks if the injection leads to privileged operations. The CVE note specifies that the exploit code is publicly available and that the attack can be launched from outside the internal network.
Affected Systems
This issue affects all instances of CodeGenieApp serverless‑express with a release of 4.17.1 or earlier. The product is identified by the CPE string for CodeGenieApp:serverless‑express; the exact component at fault is the Users Endpoint module that uses the utils/dynamodb.ts file. No later version has been confirmed to mitigate the issue, so any deployment in this range that exposes the endpoint to external traffic is at risk.
Risk and Exploitability
The base CVSS score of 5.3 indicates moderate severity. The EPSS score of less than 1 % suggests the overall likelihood of exploitation is currently low, but the presence of publicly available exploit code and a remote attack vector elevate the risk for exposed services. The vulnerability is not in the CISA KEV catalog, yet remote attackers could potentially manipulate database queries once the endpoint is reachable. Overall, the vulnerability poses moderate risk with a direct impact on data integrity and confidentiality if exploited.
OpenCVE Enrichment