CVE-2026-28438

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute malicious SQL commands by manipulating the table name provided to the CocoIndex framework, potentially leading to unauthorized changes in the database. It occurs when the application accepts an untrusted table name before making changes to the database schema, and it has been fixed in version 0.3.34.

Technical Description

CocoIndex is a data transformation framework for AI. Prior to version 0.3.34, the Doris target connector didn't verify the configured table name before creating some SQL statements (ALTER TABLE). So, in the application code, if the table name is provided by an untrusted upstream, it expose vulnerability to SQL injection when target schema change. This issue has been patched in version 0.3.34.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,000($500-$1K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Mar 6, 2026

about 1 month ago

Last Modified

Mar 10, 2026

28 days ago

Vendor

cocoindex

Product

cocoindex