sqls-server/sqls 0.2.28 is vulnerable to command injection in the config command because the openEditor function passes the EDITOR environment variable and config file path to sh -c without sanitization, allowing attackers to execute arbitrary commands.
This issue has been patched via commit https://github.com/sqls-server/sqls/commit/468a23fc89af89f632cc023a10c031e4bc781797.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-77"
],
"github_reviewed_at": "2025-10-31T17:55:40Z",
"nvd_published_at": "2025-10-30T20:15:39Z",
"severity": "HIGH"
}