OpenReplay is a self-hosted session replay suite. Prior to version 1.20.0, the POST /{projectId}/cards/search endpoint has a SQL injection in the sort.field parameter. This issue has been patched in version 1.20.0.
References
| Link | Resource |
|---|---|
| https://github.com/openreplay/openreplay/security/advisories/GHSA-q6gf-3qg3-pww5 | Exploit Vendor Advisory |
Configurations
History
17 Mar 2026, 15:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openreplay
Openreplay openreplay |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/openreplay/openreplay/security/advisories/GHSA-q6gf-3qg3-pww5 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:openreplay:openreplay:*:*:*:*:*:*:*:* |
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
05 Mar 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 21:16
Updated : 2026-03-17 15:45
NVD link : CVE-2026-28443
Mitre link : CVE-2026-28443
CVE.ORG link : CVE-2026-28443
JSON object : View
Products Affected
openreplay
- openreplay
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
