CVE-2026-34455

Hi.Events is an open-source event management and ticket selling platform. From version 0.8.0-beta.1 to before version 1.7.1-beta, multiple repository classes pass the user-supplied sort_by query parameter directly to Eloquent's orderBy() without validation, enabling SQL injection. The application uses PostgreSQL which supports stacked queries. This issue has been patched in version 1.7.1-beta.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hi.events:hi.events:*:*:*:*:*:*:*:*

History

15 Apr 2026, 14:33

Type Values Removed Values Added
References () https://github.com/HiEventsDev/Hi.Events/commit/01e1aee28d7249f235fdcca8e3a34e88214dcde9 - () https://github.com/HiEventsDev/Hi.Events/commit/01e1aee28d7249f235fdcca8e3a34e88214dcde9 - Patch
References () https://github.com/HiEventsDev/Hi.Events/pull/1128 - () https://github.com/HiEventsDev/Hi.Events/pull/1128 - Issue Tracking, Patch
References () https://github.com/HiEventsDev/Hi.Events/releases/tag/v1.7.1-beta - () https://github.com/HiEventsDev/Hi.Events/releases/tag/v1.7.1-beta - Product, Release Notes
References () https://github.com/HiEventsDev/Hi.Events/security/advisories/GHSA-2qcp-24fh-fx6p - () https://github.com/HiEventsDev/Hi.Events/security/advisories/GHSA-2qcp-24fh-fx6p - Exploit, Mitigation, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:hi.events:hi.events:*:*:*:*:*:*:*:*
First Time Hi.events hi.events
Hi.events

02 Apr 2026, 17:16

Type Values Removed Values Added
References () https://github.com/HiEventsDev/Hi.Events/security/advisories/GHSA-2qcp-24fh-fx6p - () https://github.com/HiEventsDev/Hi.Events/security/advisories/GHSA-2qcp-24fh-fx6p -

01 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 20:16

Updated : 2026-04-15 14:33


NVD link : CVE-2026-34455

Mitre link : CVE-2026-34455

CVE.ORG link : CVE-2026-34455


JSON object : View

Products Affected

hi.events

  • hi.events
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')