Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j88v-2chj-qfwx | pgx: SQL Injection via placeholder confusion with dollar quoted string literals |
Sat, 16 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 08 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jackc
Jackc pgx |
|
| Vendors & Products |
Jackc
Jackc pgx |
Fri, 08 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pgx is a PostgreSQL driver and toolkit for Go. Prior to version 5.9.2, SQL injection can occur when the non-default simple protocol is used, a dollar quoted string literal is used in the SQL query, that string literal contains text that would be would be interpreted as a placeholder outside of a string literal, and the value of that placeholder is controllable by the attacker. This issue has been patched in version 5.9.2. | |
| Title | pgx: SQL Injection via placeholder confusion with dollar quoted string literals | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T19:38:34.153Z
Reserved: 2026-04-22T15:11:54.671Z
Link: CVE-2026-41889
Updated: 2026-05-08T19:38:15.820Z
Status : Awaiting Analysis
Published: 2026-05-08T17:16:31.040
Modified: 2026-05-13T16:34:56.063
Link: CVE-2026-41889
OpenCVE Enrichment
Updated: 2026-05-08T22:30:18Z
Github GHSA