CVE-2026-41075 PUBLISHED

RT: SQL injection via entry_aggregator parameter in JSON search

Assigner: GitHub_M
Reserved: 16.04.2026 Published: 22.05.2026 Updated: 22.05.2026

RT is an open source, enterprise-grade issue and ticket tracking system. Versions 5.0.0 through 5.0.9 and 6.0.0 through 6.0.2 contain an SQL injection vulnerability. An authenticated user can craft input that is incorporated into database queries without proper validation, potentially allowing them to read or modify data in the RT database. This issue has been fixed in versions 5.0.10 and 6.0.3. If developers are unable to upgrade immediately, they can temporarily work around this issue by restricting RT account access to trusted users.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor bestpractical
Product rt
Versions
  • Version >= 5.0.0, < 5.0.10 is affected
  • Version >= 6.0.0, < 6.0.3 is affected

References

Problem Types

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE