๐Ÿ” CVE Alert

CVE-2026-30951

HIGH 7.5

Sequelize v6 Vulnerable to SQL Injection via JSON Column Cast Type

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extract a cast type, which is interpolated raw into CAST(... AS <type>) SQL. An attacker who controls JSON object keys can inject arbitrary SQL and exfiltrate data from any table. This vulnerability is fixed in 6.37.8.

CWE CWE-89
Vendor sequelize
Product sequelize
Published Mar 10, 2026
Last Updated Mar 11, 2026
Stay Ahead of the Next One

Get instant alerts for sequelize sequelize

Be the first to know when new high vulnerabilities affecting sequelize sequelize are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

sequelize / sequelize
>= 6.0.0-beta.1, < 6.37.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/sequelize/sequelize/security/advisories/GHSA-6457-6jrx-69cr