Browse all 3 CVE security advisories affecting piccolo-orm. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Piccolo-ORM is a Python ORM library designed for database interaction in web applications. Historically, it has been susceptible to remote code execution vulnerabilities due to unsafe deserialization and insecure object instantiation, with three CVEs recorded. Common issues include improper input validation leading to injection attacks and insecure default configurations. The library's dynamic query building has introduced risks where user input could manipulate query structures, potentially resulting in privilege escalation or data exposure. While no major public security incidents have been documented, the existing CVEs highlight risks in environments where untrusted input interacts with ORM functionality, particularly in applications relying on its auto-generated query features.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-30248 | Piccolo Admin's raw SVG loading may lead to complete data compromise from admin page — piccolo_adminCWE-79 | 7.7 | High | 2024-04-02 |
| CVE-2023-47128 | piccolo SQL Injection via named transaction savepoints — piccoloCWE-89 | 9.1 | Critical | 2023-11-10 |
| CVE-2023-41885 | Piccolo's current `BaseUser.login` implementation is vulnerable to time based user enumeration — piccoloCWE-204 | 5.3 | Medium | 2023-09-12 |
This page lists every published CVE security advisory associated with piccolo-orm. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.