CVE-2026-34400
Impact
The Query string search API (q=) was vulnerable to SQL injection via the Postgres query parser, which built WHERE clauses by interpolating user-supplied search terms directly into SQL strings via f-strings.
Patches
Fixed in v9.1.0. The Postgres query parser now uses parameterized queries with %(name)s placeholders passed to psycopg2's cursor.execute(), preventing SQL injection through the ?q= parameter. The MongoDB backend was not affected.
Workarounds
Upgrade to v9.1.0 or later. If unable to upgrade, deploy a proxy in front of the Alerta API to sanitize the q= parameter.
Resources
https://github.com/alerta/alerta/pull/712/files
https://owasp.org/www-community/attacks/SQL_Injection
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/alerta/alerta/security/advisories/GHSA-8prr-286p-4w7j, https://github.com/alerta/alerta/pull/2040, https://github.com/alerta/alerta/pull/712, https://github.com/alerta/alerta/commit/aeba85a37a09e5769a7a2da56481aa979ff99a00, https://github.com/alerta/alerta/commit/fdd52cd1abad8d02d1dfb8ecdcdbb43b6af3b883, https://github.com/alerta/alerta, https://github.com/alerta/alerta/releases/tag/v9.1.0
