| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j88v-2chj-qfwx | pgx: SQL Injection via placeholder confusion with dollar quoted string literals |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 21 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:jackc:pgx:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Pgx Project
Pgx Project pgx |
Thu, 21 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pgx Project
Pgx Project pgx |
|
| CPEs | cpe:2.3:a:pgx_project:pgx:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Pgx Project
Pgx Project pgx |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 16 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 08 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jackc
Jackc pgx |
|
| Vendors & Products |
Jackc
Jackc pgx |
Fri, 08 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pgx is a PostgreSQL driver and toolkit for Go. Prior to version 5.9.2, SQL injection can occur when the non-default simple protocol is used, a dollar quoted string literal is used in the SQL query, that string literal contains text that would be would be interpreted as a placeholder outside of a string literal, and the value of that placeholder is controllable by the attacker. This issue has been patched in version 5.9.2. | |
| Title | pgx: SQL Injection via placeholder confusion with dollar quoted string literals | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T19:38:34.153Z
Reserved: 2026-04-22T15:11:54.671Z
Link: CVE-2026-41889
Updated: 2026-05-08T19:38:15.820Z
Status : Analyzed
Published: 2026-05-08T17:16:31.040
Modified: 2026-05-21T19:58:12.450
Link: CVE-2026-41889
OpenCVE Enrichment
Updated: 2026-05-08T22:30:18Z
Github GHSA