Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6099-1 | python-parsl security update |
Github GHSA |
GHSA-f2mf-q878-gh58 | Parsl Monitoring Visualization Vulnerable to SQL Injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 20 Jan 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Uchicago
Uchicago parsl |
|
| CPEs | cpe:2.3:a:uchicago:parsl:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Uchicago
Uchicago parsl |
Thu, 08 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Parsl is a Python parallel scripting library. A SQL Injection vulnerability exists in the parsl-visualize component of versions prior to 2026.01.05. The application constructs SQL queries using unsafe string formatting (Python % operator) with user-supplied input (workflow_id) directly from URL routes. This allows an unauthenticated attacker with access to the visualization dashboard to inject arbitrary SQL commands, potentially leading to data exfiltration or denial of service against the monitoring database. Version 2026.01.05 fixes the issue. | |
| Title | Parsl Monitoring Visualization Vulnerable to SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T15:55:18.188Z
Reserved: 2026-01-05T17:24:36.929Z
Link: CVE-2026-21892
Updated: 2026-01-08T14:52:22.327Z
Status : Analyzed
Published: 2026-01-08T14:15:57.553
Modified: 2026-01-20T18:28:39.130
Link: CVE-2026-21892
No data.
OpenCVE Enrichment
No data.
Debian DSA
Github GHSA