| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xwqr-rcqg-22mr | Flight vulnerable to SQL Injection via unvalidated identifiers in SimplePdo::insert / update / delete |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flightphp
Flightphp core |
|
| Vendors & Products |
Flightphp
Flightphp core |
Wed, 13 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flight is an extensible micro-framework for PHP. Prior to 3.18.1, SimplePdo::insert(), SimplePdo::update(), and SimplePdo::delete() build SQL statements by concatenating the $table argument and the keys of the $data array directly into the query, with no identifier quoting and no validation. When an application forwards user-controlled data shapes to these helpers — a common and documented pattern, e.g. $db->insert('users', $request->data->getData()) — an attacker can inject arbitrary SQL by crafting malicious array keys. This vulnerability is fixed in 3.18.1. | |
| Title | Flight: SQL Injection via unvalidated identifiers in SimplePdo::insert / update / delete | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T15:44:19.900Z
Reserved: 2026-04-28T16:56:50.191Z
Link: CVE-2026-42550
Updated: 2026-05-14T15:44:04.937Z
Status : Deferred
Published: 2026-05-13T20:16:22.060
Modified: 2026-05-14T16:51:08.300
Link: CVE-2026-42550
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:39Z
Github GHSA