| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m6m4-34cj-4hh7 | MindSQL is vulnerable to Code Injection through its ask_db function |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mindinventory
Mindinventory mindsql |
|
| Vendors & Products |
Mindinventory
Mindinventory mindsql |
Fri, 20 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Mindinventory MindSQL up to 0.2.1. Impacted is the function ask_db of the file mindsql/core/mindsql_core.py. Performing a manipulation results in code injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Mindinventory MindSQL mindsql_core.py ask_db code injection | |
| Weaknesses | CWE-74 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-23T16:40:22.537Z
Reserved: 2026-03-20T14:08:32.558Z
Link: CVE-2026-4506
Updated: 2026-03-23T16:21:45.420Z
Status : Awaiting Analysis
Published: 2026-03-20T22:16:29.960
Modified: 2026-03-23T14:32:02.800
Link: CVE-2026-4506
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:52:31Z
Github GHSA