{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T10:45:06.743","vulnerabilities":[{"cve":{"id":"CVE-2026-22687","sourceIdentifier":"security-advisories@github.com","published":"2026-01-10T04:16:01.670","lastModified":"2026-03-06T15:16:09.773","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.5, after WeKnora enables the Agent service, it allows users to call the database query tool. Due to insufficient backend validation, an attacker can use prompt‑based bypass techniques to evade query restrictions and obtain sensitive information from the target server and database. This issue has been patched in version 0.2.5."},{"lang":"es","value":"WeKnora es un framework impulsado por LLM diseñado para la comprensión profunda de documentos y la recuperación semántica. Antes de la versión 0.2.5, después de que WeKnora habilita el servicio de Agente, permite a los usuarios llamar a la herramienta de consulta de la base de datos. Debido a una validación de backend insuficiente, un atacante puede usar técnicas de bypass basadas en prompts para evadir las restricciones de consulta y obtener información sensible del servidor y la base de datos objetivo. Este problema ha sido parcheado en la versión 0.2.5."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tencent:weknora:*:*:*:*:*:*:*:*","versionEndExcluding":"0.2.5","matchCriteriaId":"286261BD-8F02-4CF6-815C-EFC31708684D"}]}]}],"references":[{"url":"https://github.com/Tencent/WeKnora/commit/da55707022c252dd2c20f8e18145b2d899ee06a1","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Tencent/WeKnora/security/advisories/GHSA-pcwc-3fw3-8cqv","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/Tencent/WeKnora/security/advisories/GHSA-pcwc-3fw3-8cqv","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}