Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-30951

Опубликовано: 10 мар. 2026
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in Sequelize, a Node.js Object-Relational Mapper (ORM) tool. A remote attacker can exploit a SQL injection vulnerability by manipulating JSON object keys during JSON/JSONB where clause processing. This allows for the injection of arbitrary SQL commands due to the improper handling of cast types. The primary consequence is the potential for unauthorized data exfiltration from any database table.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Confidential Compute Attestationopenshift-sandboxed-containers/osc-pccsAffected
Red Hat Enterprise Linux 10linux-sgxAffected
Red Hat Enterprise Linux 9linux-sgxAffected
Red Hat Satellite 6satellite/iop-remediations-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-89
https://bugzilla.redhat.com/show_bug.cgi?id=2446250sequelize: Sequelize: Data exfiltration via SQL injection in JSON/JSONB where clause processing

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
17 дней назад

Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extract a cast type, which is interpolated raw into CAST(... AS <type>) SQL. An attacker who controls JSON object keys can inject arbitrary SQL and exfiltrate data from any table. This vulnerability is fixed in 6.37.8.

CVSS3: 7.5
github
16 дней назад

Sequelize v6 Vulnerable to SQL Injection via JSON Column Cast Type

7.5 High

CVSS3