CVE-2024-7099

netease-youdao/qanything version 1.4.1 contains a vulnerability where unsafe data obtained from user input is concatenated in SQL queries, leading to SQL injection. The affected functions include `get_knowledge_base_name`, `from_status_to_status`, `delete_files`, and `get_file_by_status`. An attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially stealing information from the database. The issue is fixed in version 1.4.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qanything:qanything:1.4.1:*:*:*:*:*:*:*

History

30 Jul 2025, 19:44

Type Values Removed Values Added
CPE cpe:2.3:a:qanything:qanything:1.4.1:*:*:*:*:*:*:*
References () https://github.com/netease-youdao/qanything/commit/a87354f09d93e95350fb45eb343dc75454387554 - () https://github.com/netease-youdao/qanything/commit/a87354f09d93e95350fb45eb343dc75454387554 - Patch
References () https://huntr.com/bounties/bc98983e-06cc-4a4b-be01-67e5010cb2c1 - () https://huntr.com/bounties/bc98983e-06cc-4a4b-be01-67e5010cb2c1 - Exploit, Third Party Advisory
First Time Qanything qanything
Qanything

Information

Published : 2024-10-13 21:15

Updated : 2025-07-30 19:44


NVD link : CVE-2024-7099

Mitre link : CVE-2024-7099

CVE.ORG link : CVE-2024-7099


JSON object : View

Products Affected

qanything

  • qanything
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')