← Back to CVEs
CVE-2026-34400
CRITICAL9.8
Description
Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API (q=) was vulnerable to SQL injection via the Postgres query parser, which built WHERE clauses by interpolating user-supplied search terms directly into SQL strings via f-strings. This issue has been patched in version 9.1.0.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/31/2026
Last Modified4/3/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-89
References
https://github.com/alerta/alerta/commit/aeba85a37a09e5769a7a2da56481aa979ff99a00(security-advisories@github.com)
https://github.com/alerta/alerta/commit/fdd52cd1abad8d02d1dfb8ecdcdbb43b6af3b883(security-advisories@github.com)
https://github.com/alerta/alerta/pull/2040(security-advisories@github.com)
https://github.com/alerta/alerta/pull/712(security-advisories@github.com)
https://github.com/alerta/alerta/releases/tag/v9.1.0(security-advisories@github.com)
https://github.com/alerta/alerta/security/advisories/GHSA-8prr-286p-4w7j(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.