{"id":"PYSEC-2020-342","details":"**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.","aliases":["CVE-2020-13921","GHSA-grpf-gg7v-5g5h"],"modified":"2025-10-09T07:22:35.696034Z","published":"2020-08-05T14:15:00Z","references":[{"type":"WEB","url":"https://github.com/apache/skywalking/pull/4970"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/08/05/3"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919dc1ee2cccaf237ec434dbbd6%40%3Cdev.skywalking.apache.org%3E"}],"affected":[{"package":{"name":"apache-skywalking","ecosystem":"PyPI","purl":"pkg:pypi/apache-skywalking"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.1.0","0.2.0","0.3.0","0.4.0","0.5.0","0.6.0","0.7.0","0.8.0","1.0.0","1.0.1","1.1.0","1.2.0"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/apache-skywalking/PYSEC-2020-342.yaml"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}