Source: webpy
Version: 1:0.62-5
Severity: important
Tags: security upstream
Forwarded: https://github.com/webpy/webpy/issues/806
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for webpy.

CVE-2025-3818[0]:
| A vulnerability, which was classified as critical, was found in
| webpy web.py 0.70. Affected is the function
| PostgresDB._process_insert_query of the file web/db.py. The
| manipulation of the argument seqname leads to sql injection. It is
| possible to launch the attack remotely. The exploit has been
| disclosed to the public and may be used.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-3818
    https://www.cve.org/CVERecord?id=CVE-2025-3818
[1] https://github.com/webpy/webpy/issues/806
[2] https://noppgwz8if.feishu.cn/docx/TxjpddUpTokyBwxibSgcTRr7nUf

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to