CVE-2026-21892

NameCVE-2026-21892
DescriptionParsl is a Python parallel scripting library. A SQL Injection vulnerability exists in the parsl-visualize component of versions prior to 2026.01.05. The application constructs SQL queries using unsafe string formatting (Python % operator) with user-supplied input (workflow_id) directly from URL routes. This allows an unauthenticated attacker with access to the visualization dashboard to inject arbitrary SQL commands, potentially leading to data exfiltration or denial of service against the monitoring database. Version 2026.01.05 fixes the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1125085

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-parsl (PTS)trixie2025.01.13+ds-1vulnerable
forky, sid2026.01.05+ds-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-parslsource(unstable)2026.01.05+ds-11125085

Notes

https://github.com/Parsl/parsl/security/advisories/GHSA-f2mf-q878-gh58
Fixed by: https://github.com/Parsl/parsl/commit/013a928461e70f38a33258bd525a351ed828e974 (2026.01.05)

Search for package or bug name: Reporting problems