{"id":"CVE-2022-1561","details":"Lura and KrakenD-CE versions older than v2.0.2 and KrakenD-EE versions older than v2.0.0 do not sanitize URL parameters correctly, allowing a malicious user to alter the backend URL defined for a pipe when remote users send crafty URL requests. The vulnerability does not affect KrakenD itself, but the consumed backend might be vulnerable.","modified":"2026-02-12T00:49:10.866991Z","published":"2022-08-01T13:15:09.810Z","references":[{"type":"ADVISORY","url":"https://www.incibe-cert.es/en/early-warning/security-advisories/crafted-backend-urls-lura-project"},{"type":"ADVISORY","url":"https://www.krakend.io/blog/cve-2022-1561-crafted-backend-urls/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/luraproject/lura","events":[{"introduced":"0"},{"fixed":"01d0c21cca1139347e4c122b3626ceed132045eb"}]}],"versions":["0.1","0.2","0.3","0.4","0.4.1","0.4.2","0.5","0.6.0","0.6.1","0.7.0","0.8.0","0.9.0","1.0.0","1.1.0","v0.9.0","v1.0.0","v1.1.0","v1.1.1","v1.2.0","v1.3.0","v1.4.0","v1.4.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1561.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}