Here are some news items our team found interesting over the past week, which you might have missed.
-
Go package
ekuiper
, a moderately popular server and framework for IoT data analytics and stream processing, has a SQL Injection flaw (GHSA-526j-mv3p-f4vv and CVE-2025-54379), allowing attackers to perform damaging SQL operations; the example given drops theusers
table entirely. - Popular JavaScript HTTP client library
axios
is impacted by a serious vulnerability in a downstream library. While the advisory has been withdrawn for Axios itself, the vulnerability is still present in the transitive dependencyform-data
. This means you can fix either by updating axios to at least 1.11.0, or explicitly override theform-data
version to 4.0.4.
IoT data analytics tool ekuiper has a SQLi
Go package ekuiper
, a moderately popular server and framework for IoT data analytics and stream processing, has a SQL Injection flaw (GHSA-526j-mv3p-f4vv and CVE-2025-54379), allowing attackers to perform damaging SQL operations; the example given drops the users
table entirely.
While not massively popular, the ekuiper package’s intended use case is deployment on edge IoT devices, making patching processes more difficult. This highlights the need for IoT adopters to be cautious and deliberate about product selection and have a plan for vulnerability management.
Axios system has exploitable unsafe random in transitive dependency
Popular JavaScript HTTP client library axios
is impacted by a serious vulnerability in a downstream library. While the advisory has been withdrawn for Axios itself, the vulnerability is still present in the transitive dependency form-data
. This means you can fix either by updating axios to at least 1.11.0, or explicitly override the form-data
version to 4.0.4.
While insufficient randomness can be difficult to exploit – typically requiring observing a sizeable sample of the randomly-generated values – the impact in this case could be significant as it allows an attacker to control form data being sent to an application. This advisory has a published proof-of-concept, which often makes exploitation more likely.
The publication and withdrawal of the Axios advisory highlights the challenges AppSec and Dev teams face with managing transitive dependencies. The issue is not, from one point of view, in Axios at all. But adopters of Axios are still impacted by it, and are faced with additional complexity in future maintenance if they fix the vulnerability by forcing a transitive dependency override.