VYPR
High severity8.2NVD Advisory· Published Jan 16, 2026· Updated Apr 15, 2026

CVE-2021-47782

CVE-2021-47782

Description

Odine Solutions GateKeeper 1.0 contains a SQL injection vulnerability in the trafficCycle API endpoint that allows remote attackers to inject malicious database queries. Attackers can exploit the vulnerability by sending crafted payloads to the /rass/api/v1/trafficCycle/ endpoint to manipulate PostgreSQL database queries and potentially extract sensitive information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Odine Solutions GateKeeper 1.0 contains a SQL injection vulnerability in the trafficCycle API endpoint allowing remote attackers to execute arbitrary PostgreSQL queries.

Vulnerability

Overview CVE-2021-47782 is a SQL injection vulnerability in Odine Solutions GateKeeper 1.0, affecting the trafficCycle API endpoint at /rass/api/v1/trafficCycle/. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89), allowing an attacker to inject malicious PostgreSQL queries. The vulnerability was disclosed in October 2021 and has a CVSS v4 score of 8.2, indicating high severity [3].

Exploitation

An attacker can exploit this vulnerability by sending crafted payloads to the trafficCycle endpoint. The exploit requires authentication, as the endpoint is protected by a Bearer token, but once authenticated, the attacker can manipulate SQL queries via the trafficCycle parameter. The public exploit demonstrates error-based, stacked queries, and time-based blind injection techniques using PostgreSQL-specific functions like PG_SLEEP() and CAST() [2]. The web application runs on Nginx and uses a PostgreSQL backend.

Impact

Successful exploitation allows an attacker to extract sensitive information from the database, potentially compromising user data or system credentials. The vulnerability also enables manipulation of database content, leading to data integrity issues. According to the CVSS vector, the impact on confidentiality is high, while integrity impact is low [3].

Mitigation

The vendor acknowledged the issue and released a fix, as indicated in the exploit disclosure. Users should update to a patched version of GateKeeper. No workarounds are mentioned. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of this writing.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.