Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0zMnFxLW05ZmgtZjc0d84AAyjb

MyBatis-Plus vulnerable to SQL injection via TenantPlugin

MyBatis-Plus below 3.5.3.1 is vulnerable to SQL injection via the tenant ID value. This may allow remote attackers to execute arbitrary SQL commands.

Permalink: https://github.com/advisories/GHSA-32qq-m9fh-f74w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zMnFxLW05ZmgtZjc0d84AAyjb
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-32qq-m9fh-f74w, CVE-2023-25330
References: Repository: https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC
Blast Radius: 35.9

Affected Packages

maven:com.baomidou:mybatis-plus
Dependent packages: 317
Dependent repositories: 4,589
Downloads:
Affected Version Ranges: < 3.5.3.1
No known fixed version
All affected versions: