Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30860: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Tencent WeKnora

0
Critical
VulnerabilityCVE-2026-30860cvecve-2026-30860cwe-89
Published: Sat Mar 07 2026 (03/07/2026, 16:36:45 UTC)
Source: CVE Database V5
Vendor/Project: Tencent
Product: WeKnora

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation system fails to recursively inspect child nodes within PostgreSQL array expressions and row expressions, allowing attackers to bypass SQL injection protections. By smuggling dangerous PostgreSQL functions inside these expressions and chaining them with large object operations and library loading capabilities, an unauthenticated attacker can achieve arbitrary code execution on the database server with database user privileges. This issue has been patched in version 0.2.12.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 20:01:49 UTC

Technical Analysis

Tencent WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Versions prior to 0.2.12 contain a critical SQL injection vulnerability (CVE-2026-30860) due to improper neutralization of special elements in SQL commands (CWE-89). Specifically, the application's validation system fails to recursively inspect child nodes within PostgreSQL array and row expressions. This failure allows attackers to smuggle dangerous PostgreSQL functions inside these expressions, bypassing standard SQL injection protections. Attackers can then chain these functions with large object operations and dynamic library loading capabilities inherent to PostgreSQL, enabling remote code execution (RCE) on the database server. The attack requires no authentication or user interaction, leveraging the database user privileges to execute arbitrary code. This vulnerability affects all versions before 0.2.12 and has been patched in that release. The CVSS v3.1 base score is 10.0, reflecting the critical nature of the flaw with network attack vector, low attack complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk to any organization using vulnerable WeKnora versions connected to PostgreSQL databases.

Potential Impact

The impact of CVE-2026-30860 is severe and wide-ranging. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code on the database server with the privileges of the database user. This can lead to full compromise of the database, including unauthorized data disclosure, data modification or deletion, and disruption of service. The ability to load libraries and perform large object operations further increases the attacker's capability to escalate privileges or pivot to other systems. Organizations relying on WeKnora for document understanding and semantic retrieval that use vulnerable versions risk complete loss of data confidentiality, integrity, and availability. This can result in data breaches, operational downtime, reputational damage, and regulatory penalties. The vulnerability's ease of exploitation and critical impact make it a top priority for remediation. Given the critical nature, attackers could weaponize this flaw for ransomware deployment, espionage, or sabotage.

Mitigation Recommendations

To mitigate CVE-2026-30860, organizations should immediately upgrade Tencent WeKnora to version 0.2.12 or later, where the vulnerability is patched. Additionally, organizations should: 1) Review and restrict database user privileges to the minimum necessary to limit potential damage from exploitation. 2) Implement network segmentation and firewall rules to restrict external access to the database server and WeKnora application interfaces. 3) Monitor database logs and application logs for unusual queries or large object operations that may indicate exploitation attempts. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious PostgreSQL function calls or malformed array/row expressions. 5) Conduct regular security audits and code reviews focusing on input validation and SQL query construction. 6) Consider deploying runtime application self-protection (RASP) solutions to detect and prevent SQL injection attacks in real time. 7) Educate developers and administrators about secure coding practices related to SQL query handling, especially with complex PostgreSQL data types. These targeted measures, combined with patching, will reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:27:35.342Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ac564fc48b3f10ffb12c38

Added to database: 3/7/2026, 4:46:07 PM

Last enriched: 3/14/2026, 8:01:49 PM

Last updated: 4/22/2026, 1:51:52 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses