Intel

AIKIDO-2025-10880

codesvault/howdy-qb is vulnerable to SQL Injection

SQL Injection Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

91

Critical Risk

This Affects:

PHPcodesvault/howdy-qb
1.0.0 - 1.7.0
Fixed in 1.7.1

TL;DR

Affected versions of this package are vulnerable to SQL injection. The whereIn method in Select directly interpolates user-supplied values into the SQL string, allowing malicious input to modify the query and potentially access or manipulate data. This fix replaces unsafe string concatenation with proper parameter binding by adding each value to $this->params and generating database-safe placeholders via Utilities::get_placeholder(), ensuring the WHERE IN clause is fully parameterized and protected from injection attacks.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

codesvault/howdy-qb is vulnerable to SQL Injection in versions 1.0.0 - 1.7.0.

How to fix this

Upgrade the codesvault/howdy-qb library to the patch version.