CVE-2026-31844 PUBLISHED

Authenticated SQL Injection in Koha displayby parameter of suggestion.pl

Assigner: TuranSec
Reserved: 09.03.2026 Published: 11.03.2026 Updated: 11.03.2026

An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff interface in the /cgi-bin/koha/suggestion/suggestion.pl endpoint due to improper validation of the displayby parameter used by the GetDistinctValues functionality. A low-privileged staff user can inject arbitrary SQL queries via crafted requests to this parameter, allowing execution of unintended SQL statements and exposure of sensitive database information. Successful exploitation may lead to full compromise of the backend database, including disclosure or modification of stored data.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor Koha Community
Product Koha
Versions Default: unaffected
  • affected from 24.11.0 to 24.11.12 (excl.)
  • affected from 25.05.0 to 25.05.07 (excl.)
  • affected from 25.11.0 to 25.11.01 (excl.)

Credits

  • Raximov Shukrulloh (Mothra) finder

References

Problem Types

  • CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE

Impacts

  • CAPEC-66 — SQL Injection