our health check flags this for matomo 3. Is it fixed in 4 or mitigated ?
Using the GET HTTP method, Nessus found that :+ The following resources may be vulnerable to blind SQL injection :+ The ‘action’ parameter of the /index.php CGI :/index.php?
1 post - 1 participant