| Name | Modified | Size | Downloads / Week |
|---|---|---|---|
| Parent folder | |||
| README.md | 2026-04-07 | 843 Bytes | |
| v1.8.3 - Security Fix source code.tar.gz | 2026-04-07 | 2.2 MB | |
| v1.8.3 - Security Fix source code.zip | 2026-04-07 | 2.5 MB | |
| Totals: 3 Items | 4.7 MB | 4 | |
Security
- Fix SurrealDB injection via unsanitized
order_byquery parameter (CVSS 8.7 High) GET /api/notebooksaccepted arbitrary input in theorder_byparameter, allowing injection of SurrealQL commands. Exploitable via CSRF by tricking a user into clicking a crafted URL.- Added allowlist validation for sorting parameters in the notebooks endpoint
- Replaced f-string query interpolation with parameterized
$variablebinding in source chat and migration queries - Added defensive validation in the
get_all()base method to prevent injection viaorder_byparameter
Affected versions
All versions up to and including v1.8.2.
Recommended action
Upgrade to v1.8.3 immediately.
Credit
Reported by CERT-EU Offensive Security Team via coordinated vulnerability disclosure.