A vulnerability, which was classified as critical, has been found in elgs gosqljson. This issue affects the function QueryDbToArray/QueryDbToMap/ExecDb of the file gosqljson.go. The manipulation of the argument sqlStatement leads to sql injection. The name of the patch is 2740b331546cb88eb61771df4c07d389e9f0363a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217631.
{
"cwe_ids": [
"CWE-89"
],
"nvd_published_at": "2023-01-07T20:15:00Z",
"github_reviewed": true,
"severity": "CRITICAL",
"github_reviewed_at": "2023-01-12T23:40:45Z"
}