Plattform
go
Komponente
github.com/tencent/weknora
Behoben in
0.2.13
0.2.12
CVE-2026-30860 describes a critical SQL Injection vulnerability discovered in WeKnora, an AI database query tool developed by Tencent. This flaw allows attackers to bypass security measures and potentially execute arbitrary code on the server. The vulnerability affects versions of WeKnora prior to 0.2.12, and a patch has been released to address the issue.
The SQL Injection vulnerability in WeKnora presents a significant risk. An attacker who successfully exploits this flaw can bypass authentication and authorization controls, gaining unauthorized access to the underlying database. This access can be leveraged to extract sensitive data, modify database records, or even execute arbitrary commands on the server hosting WeKnora. The potential impact includes data breaches, system compromise, and denial of service. Given the AI database query tool's purpose, the attacker could manipulate AI models or training data, leading to unpredictable and potentially harmful outcomes. The blast radius extends to any data processed or managed by WeKnora.
CVE-2026-30860 was publicly disclosed on 2026-03-10. The vulnerability's CRITICAL CVSS score (10.0) indicates a high probability of exploitation. No public proof-of-concept (POC) code has been released at the time of writing, but the severity suggests that attackers are likely actively seeking to exploit this vulnerability. It is not currently listed on the CISA KEV catalog.
Organizations utilizing WeKnora for AI database querying, particularly those handling sensitive data or integrating WeKnora into critical business processes, are at significant risk. This includes companies leveraging WeKnora for data analysis, machine learning model training, or other data-intensive applications.
• go / server:
ps aux | grep WeKnora• go / server:
journalctl -u weknora | grep "SQL injection"• generic web:
curl -I <weknora_endpoint> | grep SQLdisclosure
Exploit-Status
EPSS
0.18% (39% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-30860 is to immediately upgrade WeKnora to version 0.2.12 or later. If upgrading is not immediately feasible due to compatibility issues or system downtime constraints, consider implementing temporary workarounds. While a direct WAF rule is difficult to implement without specific query patterns, input validation and sanitization on all user-supplied data are crucial. Restrict database user permissions to the minimum necessary for WeKnora's operation. After upgrading, verify the fix by attempting a SQL injection attack on the vulnerable endpoint and confirming that the attack is blocked.
Aktualisieren Sie WeKnora auf Version 0.2.12 oder höher. Diese Version behebt die Remote Code Execution-Schwachstelle durch ordnungsgemäße Validierung der Datenbankabfragen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-30860 is a critical SQL Injection vulnerability in WeKnora, an AI database query tool, allowing attackers to potentially execute arbitrary code.
You are affected if you are using WeKnora versions prior to 0.2.12. Upgrade immediately to mitigate the risk.
Upgrade WeKnora to version 0.2.12 or later. Implement input validation and consider WAF rules as temporary mitigations.
While no public exploits are currently available, the vulnerability's severity and ease of exploitation suggest it is likely to be targeted.
Refer to the official Tencent WeKnora repository and related security advisories for the most up-to-date information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine go.mod-Datei hoch und wir sagen dir sofort, ob du betroffen bist.