{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-32714","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-13T14:33:42.824Z","datePublished":"2026-03-31T01:31:31.708Z","dateUpdated":"2026-03-31T13:58:33.774Z"},"containers":{"cna":{"title":"SciTokens vulnerable to SQL Injection in KeyCache","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/scitokens/scitokens/security/advisories/GHSA-rh5m-2482-966c","tags":["x_refsource_CONFIRM"],"url":"https://github.com/scitokens/scitokens/security/advisories/GHSA-rh5m-2482-966c"},{"name":"https://github.com/scitokens/scitokens/commit/3dba108853f2f4a6c0f2325c03779bf083c41cf2","tags":["x_refsource_MISC"],"url":"https://github.com/scitokens/scitokens/commit/3dba108853f2f4a6c0f2325c03779bf083c41cf2"},{"name":"https://github.com/scitokens/scitokens/releases/tag/v1.9.6","tags":["x_refsource_MISC"],"url":"https://github.com/scitokens/scitokens/releases/tag/v1.9.6"}],"affected":[{"vendor":"scitokens","product":"scitokens","versions":[{"version":"< 1.9.6","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-31T01:31:31.708Z"},"descriptions":[{"lang":"en","value":"SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (such as issuer and key_id). This allowed an attacker to execute arbitrary SQL commands against the local SQLite database. This issue has been patched in version 1.9.6."}],"source":{"advisory":"GHSA-rh5m-2482-966c","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/scitokens/scitokens/security/advisories/GHSA-rh5m-2482-966c","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-31T13:58:30.467209Z","id":"CVE-2026-32714","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-31T13:58:33.774Z"}}]}}