SQL inyection (SQLi) vulnerability in Umami Software web application through an improperly sanitized parameter, which could allow an authenticated attacker to execute arbitrary SQL commands in the database.Specifically, they could manipulate the value of the 'timezone' request parameter by including malicious characters and SQL payload. The application would interpolate these values directly into the SQL query without first performing proper filtering or sanitization (e.g., using functions such as 'prisma.rawQuery', 'prisma.$queryRawUnsafe' or raw queries with 'ClickHouse'). The successful explotation of this vulnerability could allow an authenticated attacker to compromiso the data of the database and execute dangerous functions.
Metrics
Affected Vendors & Products
References
History
Tue, 31 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL inyection (SQLi) vulnerability in Umami Software web application through an improperly sanitized parameter, which could allow an authenticated attacker to execute arbitrary SQL commands in the database.Specifically, they could manipulate the value of the 'timezone' request parameter by including malicious characters and SQL payload. The application would interpolate these values directly into the SQL query without first performing proper filtering or sanitization (e.g., using functions such as 'prisma.rawQuery', 'prisma.$queryRawUnsafe' or raw queries with 'ClickHouse'). The successful explotation of this vulnerability could allow an authenticated attacker to compromiso the data of the database and execute dangerous functions. | |
| Title | SQL inyection in Umami Software application | |
| First Time appeared |
Umami Software Application
Umami Software Application umami Software |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:umami_software_application:umami_software:3.0.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Umami Software Application
Umami Software Application umami Software |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-03-31T09:53:26.180Z
Reserved: 2026-03-17T09:27:25.828Z
Link: CVE-2026-4317
No data.
Status : Received
Published: 2026-03-31T10:16:19.153
Modified: 2026-03-31T10:16:19.153
Link: CVE-2026-4317
No data.