{"api_version":"1","generated_at":"2026-04-23T08:40:00+00:00","cve":"CVE-2022-3971","urls":{"html":"https://cve.report/CVE-2022-3971","api":"https://cve.report/api/cve/CVE-2022-3971.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3971","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3971"},"summary":{"title":"CVE-2022-3971","description":"A vulnerability was found in matrix-appservice-irc up to 0.35.1. It has been declared as critical. This vulnerability affects unknown code of the file src/datastore/postgres/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a73c1415e7. It is recommended to upgrade the affected component. VDB-213550 is the identifier assigned to this vulnerability.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2022-11-13 10:15:00","updated_at":"2023-11-07 03:52:00"},"problem_types":["CWE-707"],"metrics":[],"references":[{"url":"https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.36.0","name":"N/A","refsource":"N/A","tags":[],"title":"Release 0.36.0 (2022-10-25) · matrix-org/matrix-appservice-irc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?id.213550","name":"N/A","refsource":"N/A","tags":[],"title":"CVE-2022-3971 | matrix-appservice-irc PgDataStore.ts sql injection","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7","name":"N/A","refsource":"N/A","tags":[],"title":"Prevent low-risk SQL injection from roomId values when entered into t… · matrix-org/matrix-appservice-irc@179313a · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/matrix-org/matrix-appservice-irc/pull/1619","name":"N/A","refsource":"N/A","tags":[],"title":"Prevent low-risk SQL injection from roomId values when entered into the config by jaller94 · Pull Request #1619 · matrix-org/matrix-appservice-irc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3971","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3971","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"3971","vulnerable":"1","versionEndIncluding":"0.36.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"matrix","cpe5":"matrix_irc_bridge","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-3971","TITLE":"matrix-appservice-irc PgDataStore.ts sql injection","REQUESTER":"cna@vuldb.com","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"generator":"vuldb.com","affects":{"vendor":{"vendor_data":[{"vendor_name":"","product":{"product_data":[{"product_name":"matrix-appservice-irc","version":{"version_data":[{"version_value":"0.35.0"},{"version_value":"0.35.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-89 SQL Injection"}]}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in matrix-appservice-irc up to 0.35.1. It has been declared as critical. This vulnerability affects unknown code of the file src/datastore/postgres/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a73c1415e7. It is recommended to upgrade the affected component. VDB-213550 is the identifier assigned to this vulnerability."}]},"impact":{"cvss":{"version":"3.1","baseScore":"4.6","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}},"references":{"reference_data":[{"url":"https://github.com/matrix-org/matrix-appservice-irc/pull/1619","refsource":"MISC","name":"https://github.com/matrix-org/matrix-appservice-irc/pull/1619"},{"url":"https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.36.0","refsource":"MISC","name":"https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.36.0"},{"url":"https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7","refsource":"MISC","name":"https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7"},{"url":"https://vuldb.com/?id.213550","refsource":"MISC","name":"https://vuldb.com/?id.213550"}]}},"nvd":{"publishedDate":"2022-11-13 10:15:00","lastModifiedDate":"2023-11-07 03:52:00","problem_types":["CWE-707"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW","baseScore":5.6,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:matrix:matrix_irc_bridge:*:*:*:*:*:node.js:*:*","versionEndIncluding":"0.36.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}