CVE-2022-38488
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
14/12/2022
Last modified:
22/04/2025
Description
logrocket-oauth2-example through 2020-05-27 allows SQL injection via the /auth/register username parameter.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:logrocket-oauth2-example_project:logrocket-oauth2-example:*:*:*:*:*:*:*:* | 2020-05-27 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://archive.ph/PecmD
- https://archive.ph/VlGDa
- https://blog.logrocket.com/implement-oauth-2-0-node-js/
- https://github.com/diogosouza/logrocket-oauth2-example
- https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example
- https://archive.ph/PecmD
- https://archive.ph/VlGDa
- https://blog.logrocket.com/implement-oauth-2-0-node-js/
- https://github.com/diogosouza/logrocket-oauth2-example
- https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example



