Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8prr-286p-4w7j | alerta-server has potential SQL Injection vulnerability in Query String Syntax (q=) API |
Fri, 10 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alerta Project
Alerta Project alerta |
|
| CPEs | cpe:2.3:a:alerta_project:alerta:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Alerta Project
Alerta Project alerta |
Fri, 03 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alerta
Alerta alerta |
|
| Vendors & Products |
Alerta
Alerta alerta |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API (q=) was vulnerable to SQL injection via the Postgres query parser, which built WHERE clauses by interpolating user-supplied search terms directly into SQL strings via f-strings. This issue has been patched in version 9.1.0. | |
| Title | alerta-server has potential SQL Injection vulnerability in Query String Syntax (q=) API | |
| Weaknesses | CWE-89 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T16:36:42.053Z
Reserved: 2026-03-27T13:45:29.620Z
Link: CVE-2026-34400
Updated: 2026-04-03T16:36:35.520Z
Status : Analyzed
Published: 2026-03-31T22:16:18.287
Modified: 2026-04-10T01:41:30.573
Link: CVE-2026-34400
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:45:54Z
Github GHSA