Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j88v-2chj-qfwx | pgx: SQL Injection via placeholder confusion with dollar quoted string literals |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pgx is a PostgreSQL driver and toolkit for Go. Prior to version 5.9.2, SQL injection can occur when the non-default simple protocol is used, a dollar quoted string literal is used in the SQL query, that string literal contains text that would be would be interpreted as a placeholder outside of a string literal, and the value of that placeholder is controllable by the attacker. This issue has been patched in version 5.9.2. | |
| Title | pgx: SQL Injection via placeholder confusion with dollar quoted string literals | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T19:38:34.153Z
Reserved: 2026-04-22T15:11:54.671Z
Link: CVE-2026-41889
Updated: 2026-05-08T19:38:15.820Z
Status : Received
Published: 2026-05-08T17:16:31.040
Modified: 2026-05-08T17:16:31.040
Link: CVE-2026-41889
No data.
OpenCVE Enrichment
Updated: 2026-05-08T17:45:13Z
Github GHSA