๐Ÿ” CVE Alert

CVE-2026-34400

CRITICAL 9.8

alerta-server has potential SQL Injection vulnerability in Query String Syntax (q=) API

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
2th

Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API (q=) was vulnerable to SQL injection via the Postgres query parser, which built WHERE clauses by interpolating user-supplied search terms directly into SQL strings via f-strings. This issue has been patched in version 9.1.0.

CWE CWE-89
Vendor alerta
Product alerta
Published Mar 31, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for alerta alerta

Be the first to know when new critical vulnerabilities affecting alerta alerta are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

alerta / alerta
< 9.1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/alerta/alerta/security/advisories/GHSA-8prr-286p-4w7j github.com: https://github.com/alerta/alerta/pull/2040 github.com: https://github.com/alerta/alerta/pull/712 github.com: https://github.com/alerta/alerta/commit/aeba85a37a09e5769a7a2da56481aa979ff99a00 github.com: https://github.com/alerta/alerta/commit/fdd52cd1abad8d02d1dfb8ecdcdbb43b6af3b883 github.com: https://github.com/alerta/alerta/releases/tag/v9.1.0