No advisories yet.
Solution
Wakyma has fixed the vulnerability in the continuous integration deployed in production since February 19, 2026.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web application, specifically in the endpoint 'vets.wakyma.com/pets/print-tags'. This vulnerability could allow an authenticated user to alter a POST request to the affected endpoint for the purpose of injecting NoSQL commands, allowing them to list both pets and owner names. | |
| Title | Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma application web | |
| First Time appeared |
Wakyma
Wakyma wakyma Application Web |
|
| Weaknesses | CWE-943 | |
| CPEs | cpe:2.3:a:wakyma:wakyma_application_web:all_versions:*:*:*:*:*:*:* | |
| Vendors & Products |
Wakyma
Wakyma wakyma Application Web |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-03-16T13:25:33.440Z
Reserved: 2026-02-23T13:43:56.162Z
Link: CVE-2026-3023
Updated: 2026-03-16T13:25:28.963Z
Status : Received
Published: 2026-03-16T14:19:45.663
Modified: 2026-03-16T14:19:45.663
Link: CVE-2026-3023
No data.
OpenCVE Enrichment
No data.