Home

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.5, after WeKnora enables the Agent service, it allows users to call the database query tool. Due to insufficient backend validation, an attacker can use prompt‑based bypass techniques to evade query restrictions and obtain sensitive information from the target server and database. This issue has been patched in version 0.2.5.

PUBLISHED Reserved 2026-01-08 | Published 2026-01-10 | Updated 2026-01-12 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 0.2.5
affected

References

github.com/...eKnora/security/advisories/GHSA-pcwc-3fw3-8cqv exploit

github.com/...eKnora/security/advisories/GHSA-pcwc-3fw3-8cqv

github.com/...ommit/da55707022c252dd2c20f8e18145b2d899ee06a1

cve.org (CVE-2026-22687)

nvd.nist.gov (CVE-2026-22687)

Download JSON