Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gpj5-g38j-94v9 | Drizzle ORM has SQL injection via improperly escaped SQL identifiers |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Drizzle-team
Drizzle-team drizzle-orm |
|
| Vendors & Products |
Drizzle-team
Drizzle-team drizzle-orm |
Wed, 08 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific escapeName() implementations. In affected versions, embedded identifier delimiters were not escaped before the identifier was wrapped in quotes or backticks. As a result, applications that pass attacker-controlled input to APIs that construct SQL identifiers or aliases, such as sql.identifier(), .as(), may allow an attacker to terminate the quoted identifier and inject SQL. This vulnerability is fixed in 0.45.2 and 1.0.0-beta.20. | |
| Title | SQL Injection via escapeName() in all Drizzle ORM SQL dialects | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T14:33:54.466Z
Reserved: 2026-04-06T21:29:17.349Z
Link: CVE-2026-39356
Updated: 2026-04-08T14:33:47.867Z
Status : Awaiting Analysis
Published: 2026-04-07T20:16:29.610
Modified: 2026-04-08T21:27:00.663
Link: CVE-2026-39356
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:45:54Z
Github GHSA