Security
- Fix SurrealDB injection via unsanitized
order_byquery parameter (CVSS 8.7 High)GET /api/notebooksaccepted arbitrary input in theorder_byparameter, allowing injection of SurrealQL commands. Exploitable via CSRF by tricking a user into clicking a crafted URL.- Added allowlist validation for sorting parameters in the notebooks endpoint
- Replaced f-string query interpolation with parameterized
$variablebinding in source chat and migration queries - Added defensive validation in the
get_all()base method to prevent injection viaorder_byparameter
Affected versions
All versions up to and including v1.8.2.
Recommended action
Upgrade to v1.8.3 immediately.
Credit
Reported by CERT-EU Offensive Security Team via coordinated vulnerability disclosure.