-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper handling of the $select query parameter in the Service.find method. The pre-patch code in lib/index.js assigned filters.$select directly to q.attributes, allowing raw SQL injection via array-based selectors (e.g., ['(sqlite_version())', 'x']). The fix explicitly converts each $select item to a string using template literals (map(select => ${select})) to prevent Sequelize from interpreting them as raw SQL fragments. The added test case in index.test.js confirms this was the attack vector by attempting to block raw attribute selects.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| feathers-sequelize | npm | >= 6.0.0, < 6.3.4 | 6.3.4 |
KEV Misses 88% of Exploited CVEs- Get the report