| Title | erupts erupt erupt <= 1.13.3 Improper Input Validation |
|---|
| Description | Erupt contains a HQL (Hibernate Query Language) injection vulnerability in the table query functionality. The sort.field parameter from user requests is directly concatenated into the ORDER BY clause without validation or parameterization, allowing authenticated attackers to inject arbitrary HQL expressions. This enables cross-table data exfiltration through boolean-based blind injection techniques. |
|---|
| Source | ⚠️ https://fx4tqqfvdw4.feishu.cn/docx/ETWUdbPk1oCC56xoEWHc3Q28nEc?from=from_copylink |
|---|
| User | xcxr (UID 86629) |
|---|
| Submission | 03/09/2026 07:50 (1 month ago) |
|---|
| Moderation | 03/22/2026 12:59 (13 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 352431 [erupts erupt up to 1.13.3 EruptJpaUtils.java geneEruptHqlOrderBy sort.field sql injection] |
|---|
| Points | 20 |
|---|