CVE-2026-34400

CRITICAL

alerta-server has potential SQL Injection vulnerability in Query String Syntax (q=) API

Title source: cna

Description

Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API (q=) was vulnerable to SQL injection via the Postgres query parser, which built WHERE clauses by interpolating user-supplied search terms directly into SQL strings via f-strings. This issue has been patched in version 9.1.0.

Scores

CVSS v3 9.8
EPSS 0.0002
EPSS Percentile 3.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-89
Status published
Products (3)
alerta/alerta < 9.1.0
alerta_project/alerta < 9.1.0
pypi/alerta-server 0 - 9.1.0PyPI
Published Mar 31, 2026
Tracked Since Apr 01, 2026