A flaw in the database escaping API results in a SQL injection vulnerability when extension dbal is enabled and configured for MySQL passthrough mode in its extension configuration. All queries which use the DatabaseConnection::sql_query are vulnerable, even if arguments were properly escaped with DatabaseConnection::quoteStr beforehand.
{
"github_reviewed_at": "2024-06-03T16:46:05Z",
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [],
"nvd_published_at": null
}