cube-js is a headless business intelligence platform. In version 0.31.23 all authenticated Cube clients could bypass SQL row-level security and run arbitrary SQL via the newly introduced /v1/sql-runner endpoint. This issue has been resolved in version 0.31.24. Users are advised to either upgrade to 0.31.24 or to downgrade to 0.31.22. There are no known workarounds for this vulnerability.
History

Wed, 23 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-12-09T22:12:10.191Z

Updated: 2025-04-23T16:29:13.416Z

Reserved: 2022-01-19T21:23:53.775Z

Link: CVE-2022-23510

cve-icon Vulnrichment

Updated: 2024-08-03T03:43:46.464Z

cve-icon NVD

Status : Modified

Published: 2022-12-09T23:15:22.227

Modified: 2024-11-21T06:48:42.890

Link: CVE-2022-23510

cve-icon Redhat

No data.