A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘loc_filter’ parameter.
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
No PoCs found on GitHub currently.