{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-32714/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":9.8,"id":"CVE-2026-32714"}],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["sql-injection","scitokens","cve-2026-32714","web-application"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eSciTokens is a reference library for generating and using SciTokens. A critical SQL injection vulnerability, identified as CVE-2026-32714, affects SciTokens versions prior to 1.9.6. The vulnerability resides within the \u003ccode\u003eKeyCache\u003c/code\u003e class, which improperly utilizes Python\u0026rsquo;s \u003ccode\u003estr.format()\u003c/code\u003e to construct SQL queries. This allows an attacker to inject arbitrary SQL commands by manipulating user-supplied data, such as the \u003ccode\u003eissuer\u003c/code\u003e and \u003ccode\u003ekey_id\u003c/code\u003e parameters, during interactions with the local SQLite…\u003c/p\u003e\n","date_modified":"2026-03-31T03:15:55Z","date_published":"2026-03-31T03:15:55Z","id":"/briefs/2026-03-scitokens-sqli/","summary":"A SQL injection vulnerability exists in SciTokens versions before 1.9.6, allowing attackers to execute arbitrary SQL commands via the KeyCache class by manipulating user-supplied data used in SQL query construction.","title":"SciTokens KeyCache SQL Injection Vulnerability (CVE-2026-32714)","url":"https://feed.craftedsignal.io/briefs/2026-03-scitokens-sqli/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-32714","version":"https://jsonfeed.org/version/1.1"}