๐Ÿ” CVE Alert

CVE-2026-26198

CRITICAL 9.8

ormar is vulnerable to SQL Injection through aggregate functions min() and max()

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sqlalchemy.text()` without any validation or sanitization. The `min()` and `max()` methods in the `QuerySet` class accept arbitrary string input as the column parameter. While `sum()` and `avg()` are partially protected by an `is_numeric` type check that rejects non-existent fields, `min()` and `max()` skip this validation entirely. As a result, an attacker-controlled string is embedded as raw SQL inside the aggregate function call. Any unauthorized user can exploit this vulnerability to read the entire database contents, including tables unrelated to the queried model, by injecting a subquery as the column parameter. Version 0.23.0 contains a patch.

CWE CWE-89
Vendor collerek
Product ormar
Published Feb 24, 2026
Last Updated Feb 24, 2026
Stay Ahead of the Next One

Get instant alerts for collerek ormar

Be the first to know when new critical vulnerabilities affecting collerek ormar are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

collerek / ormar
>= 0.9.9, < 0.23.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/collerek/ormar/security/advisories/GHSA-xxh2-68g9-8jqr github.com: https://github.com/collerek/ormar/commit/a03bae14fe01358d3eaf7e319fcd5db2e4956b16 github.com: https://github.com/collerek/ormar/releases/tag/0.23.0