{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "fixed": "1.7.4"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "59f2879ccc7d88690979ba20d6de9d48c324cbd7"
            },
            {
              "fixed": "9d179a36d320330ddb303ea3a7c98d3a33d231db"
            }
          ],
          "repo": "https://github.com/jackalope/jackalope-doctrine-dbal",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "Jackalope Doctrine-DBAL is an implementation of the PHP Content Repository API (PHPCR) using a relational database to persist data. In affected versions users can provoke SQL injections if they can specify a node name or query. Upgrade to version 1.7.4 to resolve this issue. If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\\Transport\\DoctrineDBAL\\Query\\QOMWalker`: `XPath::escape($property)`. Node names and xpaths can contain `\"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected.",
  "id": "CVE-2021-43822",
  "modified": "2026-03-13T21:50:31.574323532Z",
  "published": "2021-12-13T20:15:07.757Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm"
    },
    {
      "type": "FIX",
      "url": "https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db"
    }
  ],
  "related": [
    "GHSA-ph98-v78f-jqrm"
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}