Impact
The vulnerability resides in the order_by parameter of the ElectricSQL /v1/shape API and permits error‑based SQL injection, allowing any authenticated user to execute arbitrary SQL against the underlying PostgreSQL database. This flaw makes it possible to read, modify, and delete all database contents, effectively giving full control over the database. The weakness is a classic SQL injection (CWE‑89).
Affected Systems
Electric PostgreSQL sync engine versions from 1.1.12 up to, but not including, 1.5.0 are affected.
Risk and Exploitability
The CVSS score is 10, reflecting the catastrophic impact. The EPSS score is not available, and the vulnerability is not listed in CISA KEV. Attackers need authenticated access to the /v1/shape endpoint; once authenticated, they can craft ORDER BY expressions to trigger the injection, read or modify any table, and even delete data.
OpenCVE Enrichment