← Back to CVEs
CVE-2023-25813
CRITICAL10.0
Description
Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query.
CVE Details
CVSS v3.1 Score10.0
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/22/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
sequelizejs:sequelize
Weaknesses (CWE)
CWE-89CWE-89
References
https://github.com/sequelize/sequelize/commit/ccaa3996047fe00048d5993ab2dd43ebadd4f78b(security-advisories@github.com)
https://github.com/sequelize/sequelize/issues/14519(security-advisories@github.com)
https://github.com/sequelize/sequelize/releases/tag/v6.19.1(security-advisories@github.com)
https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw(security-advisories@github.com)
https://github.com/sequelize/sequelize/commit/ccaa3996047fe00048d5993ab2dd43ebadd4f78b(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/sequelize/sequelize/issues/14519(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/sequelize/sequelize/releases/tag/v6.19.1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.