A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/mesherypatternpersister.go).
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-31856.json"