{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:45:43.724","vulnerabilities":[{"cve":{"id":"CVE-2024-45794","sourceIdentifier":"security-advisories@github.com","published":"2024-11-07T18:15:17.150","lastModified":"2025-02-28T15:35:22.800","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"devtron is an open source tool integration platform for Kubernetes. In affected versions an authenticated user (with minimum permission) could utilize and exploit SQL Injection to allow the execution of malicious SQL queries via CreateUser API (/orchestrator/user). This issue has been addressed in version 0.7.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"devtron es una plataforma de integración de herramientas de código abierto para Kubernetes. En las versiones afectadas, un usuario autenticado (con el permiso mínimo) podría utilizar y explotar la inyección SQL para permitir la ejecución de consultas SQL maliciosas a través de la API CreateUser (/orchestrator/user). Este problema se ha solucionado en la versión 0.7.2 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:devtron:devtron:*:*:*:*:*:kubernetes:*:*","versionEndExcluding":"0.7.2","matchCriteriaId":"090E860D-52C1-4A7E-9FDC-2EB3C0D00D3B"}]}]}],"references":[{"url":"https://github.com/devtron-labs/devtron/security/advisories/GHSA-q78v-cv36-8fxj","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}