Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query.
History

Mon, 10 Mar 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-03-10T21:07:11.770Z

Reserved: 2023-02-15T16:34:48.773Z

Link: CVE-2023-25813

cve-icon Vulnrichment

Updated: 2024-08-02T11:32:12.360Z

cve-icon NVD

Status : Modified

Published: 2023-02-22T19:15:11.777

Modified: 2024-11-21T07:50:15.077

Link: CVE-2023-25813

cve-icon Redhat

No data.