Description
A weakness has been identified in CodeGenieApp serverless-express up to 4.17.1. This affects an unknown part of the file utils/dynamodb.ts of the component Users Endpoint. This manipulation of the argument filter causes injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Injection Vulnerability
Action: Patch
AI Analysis

Impact

The vulnerability exists in CodeGenieApp serverless‑express up to version 4.17.1, in an undefined portion of the file utils/dynamodb.ts that implements the Users Endpoint. By manipulating the query filter argument an attacker can inject arbitrary content into the DynamoDB query, resulting in unintended data retrieval or modification. This is an injection weakness that aligns with CWE‑74 (Improper Filtering of Input) and CWE‑707 (Improper Validation or Sanitization). The effect is the potential compromise of confidentiality and integrity of stored data, and may assist in carrying out further attacks if the injection leads to privileged operations. The CVE note specifies that the exploit code is publicly available and that the attack can be launched from outside the internal network.

Affected Systems

This issue affects all instances of CodeGenieApp serverless‑express with a release of 4.17.1 or earlier. The product is identified by the CPE string for CodeGenieApp:serverless‑express; the exact component at fault is the Users Endpoint module that uses the utils/dynamodb.ts file. No later version has been confirmed to mitigate the issue, so any deployment in this range that exposes the endpoint to external traffic is at risk.

Risk and Exploitability

The base CVSS score of 5.3 indicates moderate severity. The EPSS score of less than 1 % suggests the overall likelihood of exploitation is currently low, but the presence of publicly available exploit code and a remote attack vector elevate the risk for exposed services. The vulnerability is not in the CISA KEV catalog, yet remote attackers could potentially manipulate database queries once the endpoint is reachable. Overall, the vulnerability poses moderate risk with a direct impact on data integrity and confidentiality if exploited.

Generated by OpenCVE AI on March 18, 2026 at 17:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade CodeGenieApp serverless‑express to a release newer than 4.17 as soon as it becomes available
  • If an upgrade cannot be applied immediately, restrict access to the Users Endpoint by firewall rules, IP whitelisting, or placing it behind an API‑gateway with authentication
  • Validate and sanitize all incoming filter arguments prior to passing them to DynamoDB, ensuring that only expected patterns are allowed
  • Monitor request logs for anomalous filter values and configure alerts for suspicious activity

Generated by OpenCVE AI on March 18, 2026 at 17:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Codegenieapp
Codegenieapp serverless-express
Vendors & Products Codegenieapp
Codegenieapp serverless-express

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in CodeGenieApp serverless-express up to 4.17.1. This affects an unknown part of the file utils/dynamodb.ts of the component Users Endpoint. This manipulation of the argument filter causes injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title CodeGenieApp serverless-express Users Endpoint dynamodb.ts injection
Weaknesses CWE-707
CWE-74
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Codegenieapp Serverless-express
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T14:28:51.389Z

Reserved: 2026-03-11T16:51:16.896Z

Link: CVE-2026-3992

cve-icon Vulnrichment

Updated: 2026-03-12T14:28:47.790Z

cve-icon NVD

Status : Deferred

Published: 2026-03-12T06:16:31.683

Modified: 2026-04-22T21:30:26.497

Link: CVE-2026-3992

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:01Z

Weaknesses