Description
@adonisjs/lucid is an SQL ORM for AdonisJS built on top of Knex. Prior to 21.8.2 and 22.0.0-next.6, there is a Mass Assignment vulnerability in AdonisJS Lucid which may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may lead to logic bypasses and unauthorized record modification within a table or model. This affects @adonisjs/lucid through version 21.8.1 and 22.x pre-release versions prior to 22.0.0-next.6. This has been patched in @adonisjs/lucid versions 21.8.2 and 22.0.0-next.6.
Published: 2026-01-13
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized record modification and logic bypass
Action: Immediate Patch
AI Analysis

Impact

Mass Assignment allows a remote attacker who can influence data passed into AdonisJS Lucid model assignments to overwrite the internal ORM state. This flaw permits logic bypasses and unauthorized record modifications within a table or model. The weakness is classified as CWE‑915, reflecting improper data handling leading to loss of control over program flow.

Affected Systems

The vulnerability affects the AdonisJS Lucid SQL ORM, versions through 21.8.1 and all 22.x pre‑release releases prior to 22.0.0‑next.6 . Users of these versions are at risk.

Risk and Exploitability

The CVSS score of 8.2 denotes a high severity risk, yet the EPSS score is below 1 %, suggesting a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, requiring an attacker to supply crafted data that is subsequently assigned to a Lucid model – a scenario that is common when user input is bound to models without proper safeguards.

Generated by OpenCVE AI on April 18, 2026 at 06:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to @adonisjs/lucid 21.8.2 or later, including 22.0.0‑next.6 where the issue is fixed.
  • Sanitize or validate all input before passing it to model assignments to prevent unintended data from reaching internal ORM state.
  • Implement attribute whitelisting or use guarded fields to restrict mass assignment only to intended properties.

Generated by OpenCVE AI on April 18, 2026 at 06:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g5gc-h5hp-555f Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State
History

Wed, 14 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Adonisjs
Adonisjs lucid
Vendors & Products Adonisjs
Adonisjs lucid

Tue, 13 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description @adonisjs/lucid is an SQL ORM for AdonisJS built on top of Knex. Prior to 21.8.2 and 22.0.0-next.6, there is a Mass Assignment vulnerability in AdonisJS Lucid which may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may lead to logic bypasses and unauthorized record modification within a table or model. This affects @adonisjs/lucid through version 21.8.1 and 22.x pre-release versions prior to 22.0.0-next.6. This has been patched in @adonisjs/lucid versions 21.8.2 and 22.0.0-next.6.
Title Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State
Weaknesses CWE-915
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-14T17:26:12.012Z

Reserved: 2026-01-09T22:50:10.288Z

Link: CVE-2026-22814

cve-icon Vulnrichment

Updated: 2026-01-14T17:26:09.379Z

cve-icon NVD

Status : Deferred

Published: 2026-01-13T20:16:11.427

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22814

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:45:23Z

Weaknesses