SQL injection could be achieved via a specially crafted request, which could allow malicious person to gain access to sensitive information.
Upgrading is required, no other workaround is present.
{ "nvd_published_at": "2025-03-26T17:15:26Z", "cwe_ids": [ "CWE-89" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-03-26T17:13:08Z" }