| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8w32-6mrw-q5wv | WeKnora Vulnerable to Remote Code Execution via SQL Injection Bypass in AI Database Query Tool |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tencent:weknora:*:*:*:*:*:*:*:* |
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tencent
Tencent weknora |
|
| Vendors & Products |
Tencent
Tencent weknora |
Sat, 07 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation system fails to recursively inspect child nodes within PostgreSQL array expressions and row expressions, allowing attackers to bypass SQL injection protections. By smuggling dangerous PostgreSQL functions inside these expressions and chaining them with large object operations and library loading capabilities, an unauthenticated attacker can achieve arbitrary code execution on the database server with database user privileges. This issue has been patched in version 0.2.12. | |
| Title | WeKnora: Remote Code Execution via SQL Injection Bypass in AI Database Query Tool | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T18:24:08.315Z
Reserved: 2026-03-05T21:27:35.342Z
Link: CVE-2026-30860
Updated: 2026-03-09T17:58:54.585Z
Status : Analyzed
Published: 2026-03-07T17:15:53.823
Modified: 2026-03-09T17:35:41.243
Link: CVE-2026-30860
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:04:00Z
Github GHSA