Hasura GraphQL 1.3.3 contains a local file read vulnerability that allows attackers to access system files through SQL injection in the query endpoint. Attackers can exploit the pg_read_file() PostgreSQL function by crafting malicious SQL queries to read arbitrary files on the server.
References
| Link | Resource |
|---|---|
| https://github.com/hasura/graphql-engine | Product |
| https://www.exploit-db.com/exploits/49790 | Exploit |
| https://www.vulncheck.com/advisories/hasura-graphql-local-file-read-via-sql-injection | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-22 22:15
Updated : 2025-12-27 17:15
NVD link : CVE-2021-47714
Mitre link : CVE-2021-47714
CVE.ORG link : CVE-2021-47714
JSON object : View
Products Affected
hasura
- graphql_engine
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
