Currently supporting version 1.0.0 with security updates.
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
-
FastAPI Content-Type Header ReDoS
- Package: fastapi
- Previous Version: 0.104.1
- Patched Version: 0.109.1
- Severity: Medium
- CVE: Duplicate Advisory
- Description: FastAPI was vulnerable to Regular Expression Denial of Service (ReDoS) via Content-Type header parsing
- Impact: Could allow attackers to cause denial of service through crafted Content-Type headers
- Fix: Upgraded to FastAPI 0.109.1
-
Python-Multipart Arbitrary File Write
- Package: python-multipart
- Previous Version: 0.0.6
- Patched Version: 0.0.22
- Severity: High
- Description: Arbitrary file write vulnerability via non-default configuration
- Impact: Could allow attackers to write arbitrary files to the server
- Fix: Upgraded to python-multipart 0.0.22
-
Python-Multipart DoS via Malformed Boundary
- Package: python-multipart
- Previous Version: 0.0.6
- Patched Version: 0.0.22 (fixed in 0.0.18)
- Severity: Medium
- Description: Denial of service via deformation multipart/form-data boundary
- Impact: Could allow attackers to cause denial of service
- Fix: Upgraded to python-multipart 0.0.22
-
Python-Multipart Content-Type Header ReDoS
- Package: python-multipart
- Previous Version: 0.0.6
- Patched Version: 0.0.22 (fixed in 0.0.7)
- Severity: Medium
- Description: Vulnerable to Content-Type Header Regular Expression Denial of Service
- Impact: Could allow attackers to cause denial of service through crafted Content-Type headers
- Fix: Upgraded to python-multipart 0.0.22
-
SQL Injection in Tenant Context Setting
- Date: 2026-01-27
- Severity: Critical
- Description: SQL injection vulnerability in
src/database/session.pywhere organization_id was directly interpolated into SQL string - Fix: Implemented parameterized queries using SQLAlchemy's
text()with parameter binding - File:
src/database/session.py
-
Potential AttributeError in Rate Limiter
- Date: 2026-01-27
- Severity: Low
- Description: AttributeError when
user_idis None in rate limiter middleware - Fix: Added graceful handling with default value "anonymous"
- File:
src/middleware/rate_limiter.py
-
Synchronous Database Operations Blocking Requests
- Date: 2026-01-27
- Severity: Medium
- Description: Audit logging middleware performed synchronous database operations, blocking request processing
- Fix: Converted to async background task processing
- File:
src/middleware/audit_logger.py
If you discover a security vulnerability in this project, please report it by:
- DO NOT open a public GitHub issue
- Email the security details to: [security contact would go here]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We aim to respond to security reports within 48 hours and will keep you informed of the fix progress.
When deploying this application:
-
Environment Variables
- Always use strong, randomly generated values for
SECRET_KEYandJWT_SECRET_KEY - Never commit
.envfile to version control - Use different secrets for production and development
- Always use strong, randomly generated values for
-
Database
- Use strong database passwords
- Enable SSL connections in production
- Regularly backup database
- Keep PostgreSQL updated
-
Dependencies
- Regularly run
pip list --outdatedto check for updates - Monitor security advisories for Python packages
- Use tools like
safetyorpip-auditto scan for vulnerabilities
- Regularly run
-
Rate Limiting
- Keep rate limiting enabled in production
- Adjust limits based on your tier structure
- Monitor for abuse patterns
-
Audit Logs
- Keep audit logs enabled
- Regularly review logs for suspicious activity
- Set up alerts for critical actions
-
HTTPS
- Always use HTTPS in production
- Configure proper SSL/TLS certificates
- Enable HSTS headers
-
CORS
- Configure CORS to only allow trusted origins
- Never use
allow_origins=["*"]in production
-
Stripe
- Use Stripe test keys in development
- Verify webhook signatures
- Keep Stripe SDK updated
This project uses:
- CodeQL: Static code analysis (0 vulnerabilities found)
- Dependency Scanning: GitHub Advisory Database checks
- Code Review: Automated code review for security issues
Last security scan: 2026-01-27 Status: ✅ All known vulnerabilities addressed
For security concerns, please contact the repository maintainers.