codesvault/howdy-qb is vulnerable to SQL Injection
91
Critical Risk
Affected versions of this package are vulnerable to SQL injection. The whereIn method in Select directly interpolates user-supplied values into the SQL string, allowing malicious input to modify the query and potentially access or manipulate data. This fix replaces unsafe string concatenation with proper parameter binding by adding each value to $this->params and generating database-safe placeholders via Utilities::get_placeholder(), ensuring the WHERE IN clause is fully parameterized and protected from injection attacks.
You are affected if you are using a version that falls within the vulnerable range.
codesvault/howdy-qb is vulnerable to SQL Injection in versions 1.0.0 - 1.7.0.
Upgrade the codesvault/howdy-qb library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant