Jan 6, 2026·6 min read·5 visits
The 'parsl-visualize' dashboard fails to sanitize the 'workflow_id' URL parameter before passing it to a raw SQL query. This allows unauthenticated remote attackers to execute arbitrary SQL commands via Boolean-based blind injection. The vulnerability affects all versions prior to the January 5, 2026 patch.
Parsl, a parallel scripting library for Python often used in academic and high-performance computing (HPC) environments, contains a critical SQL injection vulnerability in its monitoring dashboard. The flaw allows unauthenticated attackers to manipulate database queries via the visualization interface, potentially exposing sensitive workflow metadata and environment configurations.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L| Product | Affected Versions | Fixed Version |
|---|---|---|
Parsl Parsl | < Commit 013a928461e70f38a33258bd525a351ed828e974 | Commit 013a928461e70f38a33258bd525a351ed828e974 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-89 (SQL Injection) |
| Attack Vector | Network (Web Dashboard) |
| CVSS Score | 8.6 (High) |
| Affected Component | parsl.monitoring.visualization |
| Exploit Status | PoC Available |
| Authentication | None Required |
The software constructs all or part of an SQL command using an input that might be influenced by an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.