Vulnerability Description
Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extract a cast type, which is interpolated raw into CAST(... AS <type>) SQL. An attacker who controls JSON object keys can inject arbitrary SQL and exfiltrate data from any table. This vulnerability is fixed in 6.37.8.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sequelizejs | Sequelize | < 6.37.8 |
Related Weaknesses (CWE)
References
- https://github.com/sequelize/sequelize/security/advisories/GHSA-6457-6jrx-69crExploitMitigationVendor Advisory
FAQ
What is CVE-2026-30951?
CVE-2026-30951 is a vulnerability with a CVSS score of 7.5 (HIGH). Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extr...
How severe is CVE-2026-30951?
CVE-2026-30951 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-30951?
Check the references section above for vendor advisories and patch information. Affected products include: Sequelizejs Sequelize.