CVE-2026-28438
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
CocoIndex is a data transformation framework for AI. Prior to version 0.3.34, the Doris target connector didn't verify the configured table name before creating some SQL statements (ALTER TABLE). So, in the application code, if the table name is provided by an untrusted upstream, it expose vulnerability to SQL injection when target schema change. This issue has been patched in version 0.3.34.
Analysis
SQL injection in CocoIndex Doris connector before 0.3.34. Patch available.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all systems running CocoIndex versions prior to 0.3.34 and isolate affected environments from production if patching cannot be completed immediately. Within 7 days: Apply vendor patch to upgrade all CocoIndex instances to version 0.3.34 or later and validate functionality in a test environment before production deployment. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-59g6-v3vg-f7wc