Impact
A flaw was identified in JawherKl node-api-postgres versions up to 2.5 that allows an attacker to manipulate the sort parameter in the User.getAll function, resulting in arbitrary SQL code execution. The vulnerability is classified as a classic SQL injection (CWE-74 and CWE-89) and can be used to read, modify, or delete data stored in the database. This weakness directly affects the integrity and confidentiality of the data processed by the application.
Affected Systems
JawherKl:node-api-postgres, all releases and sub‑versions up to and including 2.5. The vulnerability is found in the models/user.js file, specifically within the User.getAll functionality that accepts a sort argument without proper validation.
Risk and Exploitability
The CVSS base score of 6.9 indicates moderate to high severity, while an EPSS score of less than 1 % suggests a low likelihood of automated exploitation. The vulnerability is not listed in CISA’s KEV catalog. Attackers can trigger the flaw remotely via the exposed API endpoint by supplying a crafted sort parameter that injects malicious SQL commands.
OpenCVE Enrichment