Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
WS-2018-0023
Published:May 14, 2026
Updated:May 14, 2026
In Propel2 versions 2.0.0-alpha1 before 2.0.0-alpha8 when constructing a MySQL LIMIT clause, values for the offset and limit are coerced to integers. This prevents arbitrary SQL from being injected via a query limit.
Affected Packages
propel/propel (PHP):
Affected version(s) >=2.0.0-alpha2 <2.0.0-alpha8
Fix Suggestion:
Update to version 2.0.0-alpha8
thelia/propel (PHP):
Affected version(s) =dev-master <dev-test-propel-with-tablemap-resolver
Fix Suggestion:
Update to version dev-test-propel-with-tablemap-resolver
ansas/propel (PHP):
Affected version(s) >=2.0.0-alpha2 <2.0.0-alpha8
Fix Suggestion:
Update to version 2.0.0-alpha8
upinion/propel2 (PHP):
Affected version(s) =dev-revert-1348-patch-2
Fix Suggestion:
Update to version no_fix
propel/propel (PHP):
Affected version(s) =2.0.0-alpha1 <2.0.0-alpha10
Fix Suggestion:
Update to version 2.0.0-alpha10
fxdsp/propel (PHP):
Affected version(s) >=2.0.0-alpha2 <2.0.0-alpha8
Fix Suggestion:
Update to version 2.0.0-alpha8
dmelo/propel (PHP):
Affected version(s) >=dev-code-enhancement <=dev-issue-900
Fix Suggestion:
Update to version no_fix
onuragtas/propel (PHP):
Affected version(s) >=2.0.0-alpha2 <2.0.0-alpha8
Fix Suggestion:
Update to version 2.0.0-alpha8
onuragtas/propel (PHP):
Affected version(s) =2.0.0-alpha1 <2.0.0-alpha10
Fix Suggestion:
Update to version 2.0.0-alpha10
upinion/propel2 (PHP):
Affected version(s) =dev-master <2.0.0-alpha1
Fix Suggestion:
Update to version 2.0.0-alpha1
thelia/propel (PHP):
Affected version(s) >=2.0.0-alpha1 <dev-thelia-2.1
Fix Suggestion:
Update to version dev-thelia-2.1
ansas/propel (PHP):
Affected version(s) =2.0.0-alpha1 <2.0.0-alpha10
Fix Suggestion:
Update to version 2.0.0-alpha10
fxdsp/propel (PHP):
Affected version(s) =2.0.0-alpha1 <2.0.0-alpha10
Fix Suggestion:
Update to version 2.0.0-alpha10
jdombroski/propel (PHP):
Affected version(s) =dev-revert-1348-patch-2
Fix Suggestion:
Update to version no_fix
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW