@nuxt/content is vulnerable to SQL Injection
81
High Risk
Affected versions of this package allowed overly permissive COUNT(*) query patterns, where the validation regex was not anchored and did not enforce the expected as count alias, potentially letting crafted SQL fragments bypass the intended format restriction. An attacker able to influence the counted expression could abuse this weak validation to inject or append unintended SQL into count-based queries, which may lead to query manipulation, authorization bypass in query-building logic, or exposure of unintended database behavior.
You are affected if you are using a version that falls within the vulnerable range.
@nuxt/content is vulnerable to SQL Injection in versions 3.2.0 - 3.12.0.
Upgrade the @nuxt/content library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant