VULNERABILITY CONFIRMED: GHSA-xx6w-jxg9-2wh8 File: packages/drizzle/src/queries/parseParams.ts Issue: SQL Injection in JSON/RichText field queries VULNERABLE CODE: In v3.72.0, user input is directly concatenated into SQL: formattedValue = '${operatorKeys[operator].wildcard}${val}${operatorKeys[operator].wildcard}' PATCH (v3.73.0): formattedValue = '${operatorKeys[operator].wildcard}${escapeSQLValue(val)}${operatorKeys[operator].wildcard}' The escapeSQLValue() function validates input against: /^[\w @.\-+:]*$/ IMPACT: - Blind SQL injection via REST API where clauses on JSON/richText fields - Data extraction possible (emails, password reset tokens) - Account takeover without password cracking AFFECTED VERSIONS: < v3.73.0 FIXED VERSION: v3.73.0