CVE-2026-34400
CRITICALalerta-server has potential SQL Injection vulnerability in Query String Syntax (q=) API
Title source: cnaDescription
Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API (q=) was vulnerable to SQL injection via the Postgres query parser, which built WHERE clauses by interpolating user-supplied search terms directly into SQL strings via f-strings. This issue has been patched in version 9.1.0.
Scores
CVSS v3
9.8
EPSS
0.0002
EPSS Percentile
3.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-89
Status
published
Products (3)
alerta/alerta
< 9.1.0
alerta_project/alerta
< 9.1.0
pypi/alerta-server
0 - 9.1.0PyPI
Published
Mar 31, 2026
Tracked Since
Apr 01, 2026