Description
Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extract a cast type, which is interpolated raw into CAST(... AS <type>) SQL. An attacker who controls JSON object keys can inject arbitrary SQL and exfiltrate data from any table. This vulnerability is fixed in 6.37.8.
Published: 2026-03-10
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Database Compromise via SQL Injection
Action: Immediate Patch
AI Analysis

Impact

Sequelize is a Node.js ORM used to interact with relational databases. In versions before 6.37.8, the internal _traverseJSON() function splits JSON path keys on the delimiter '::' to extract a presumed cast type. This type is then interpolated directly into a SQL CAST clause without escaping. An attacker who can control the keys of a JSON object supplied to the ORM can insert arbitrary SQL fragments, enabling execution of unintended statements and exfiltration of data from any table. The vulnerability is an instance of CWE‑89 as it involves unsanitized input used in SQL generation.

Affected Systems

The affected product is Sequelize, the Node.js ORM, with all versions released prior to 6.37.8. This includes the open‑source Sequelize project managed by Sequelizejs:sequelize. Any deployment that relies on these versions for database interactions is at risk.

Risk and Exploitability

The CVSS base score of 7.5 indicates significant potential impact. The EPSS score is less than 1%, suggesting that exploitation is not common in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is application‑layer input manipulation: an attacker must supply crafted JSON keys that are processed by Sequelize’s where clause logic. Successful exploitation would give the attacker unauthorized database access and the ability to read or modify data, which could directly compromise confidentiality and integrity.

Generated by OpenCVE AI on April 16, 2026 at 03:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Sequelize to version 6.37.8 or newer.
  • Validate or sanitize all JSON object keys to remove the '::' casting syntax before they are passed to Sequelize.
  • Review application code to ensure no untrusted JSON input is used directly in where clauses or SQL construction.

Generated by OpenCVE AI on April 16, 2026 at 03:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6457-6jrx-69cr Sequelize v6 Vulnerable to SQL Injection via JSON Column Cast Type
History

Wed, 18 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sequelizejs:sequelize:*:*:*:*:*:node.js:*:*

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sequelizejs
Sequelizejs sequelize
Vendors & Products Sequelizejs
Sequelizejs sequelize

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Title SQL Injection via JSON Column Cast Type in Sequelize v6 Sequelize v6 Vulnerable to SQL Injection via JSON Column Cast Type

Tue, 10 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extract a cast type, which is interpolated raw into CAST(... AS <type>) SQL. An attacker who controls JSON object keys can inject arbitrary SQL and exfiltrate data from any table. This vulnerability is fixed in 6.37.8.
Title SQL Injection via JSON Column Cast Type in Sequelize v6
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Sequelizejs Sequelize
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T14:40:34.034Z

Reserved: 2026-03-07T17:34:39.980Z

Link: CVE-2026-30951

cve-icon Vulnrichment

Updated: 2026-03-11T14:40:29.642Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T21:16:48.030

Modified: 2026-03-18T19:16:04.997

Link: CVE-2026-30951

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-10T20:22:46Z

Links: CVE-2026-30951 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T03:30:06Z

Weaknesses