Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zMnFxLW05ZmgtZjc0d84AAyjb
MyBatis-Plus vulnerable to SQL injection via TenantPlugin
MyBatis-Plus below 3.5.3.1 is vulnerable to SQL injection via the tenant ID value. This may allow remote attackers to execute arbitrary SQL commands.
Permalink: https://github.com/advisories/GHSA-32qq-m9fh-f74wJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zMnFxLW05ZmgtZjc0d84AAyjb
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-32qq-m9fh-f74w, CVE-2023-25330
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-25330
- https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md
- https://github.com/advisories/GHSA-32qq-m9fh-f74w
Blast Radius: 35.9
Affected Packages
maven:com.baomidou:mybatis-plus
Dependent packages: 317Dependent repositories: 4,589
Downloads:
Affected Version Ranges: < 3.5.3.1
No known fixed version
All affected versions: