From the provided GitHub Security Advisory screenshot, the following critical information about the vulnerability can be summarized: Vulnerability: Authenticated Time-based SQL Injection in . Package: . Affected Versions: . Patched Versions: None (indicating the vulnerability may not yet be repaired). Severity: 7.2 / 10 with a High Severity rating. CVSS v3 Base Metrics: - Attack Vector: Network. - Attack Complexity: Low. - Privileges Required: High. - User Interaction: None. - Scope: Unchanged. - Confidentiality, Integrity, and Availability: All rated High. CVE ID: CVE-2025-65023. Weaknesses: CWE-89, associated with SQL injection vulnerabilities. Description: - The vulnerability stems from the GET parameter being directly concatenated into an SQL query without sanitization. - Located in the method of , allowing an attacker with authentication to execute arbitrary SQL commands. Vulnerable Code: - Shows a segment where a GET parameter is assigned to a class property, which is later used in a SQL query without escaping. Impact: - Bypass authorization, data exfiltration, data tampering, and denial of service. For proof-of-concept (PoC), the advisory presents a URL with a SQL injection payload that uses to pause the database and confirm vulnerability.