OData injection allows an attacker to manipulate the query parameters of an OData API (such as $filter, $orderby, etc.) to access, modify, or exfiltrate unauthorized data by exploiting insufficient validation or filtering.
- Exposure of sensitive data (users, emails, hashed passwords, etc.)
- Bypass of access controls
- Modification of data (in extreme cases)
- Execution of unintended logic in the backend
- Validate and sanitize all OData parameters.
- Restrict the allowed OData operators.
- Use libraries that correctly implement OData parsing.
- Enforce access control on the backend, without relying solely on client-side filters.
Authenticated attacker from the Internet.
⌚ 360 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.