VYPR
Critical severityNVD Advisory· Published Oct 25, 2022· Updated Mar 11, 2025

Feathers - Improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection

CVE-2022-29822

Description

Due to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
feathers-sequelizenpm
>= 6.0.0, < 6.3.46.3.4

Affected products

1

Patches

1
0f2d85f0b2d5

Do not allow raw attribute selects (#393)

2 files changed · +7 1
  • lib/index.js+1 1 modified
    @@ -133,7 +133,7 @@ class Service extends AdapterService {
         }, params.sequelize);
     
         if (filters.$select) {
    -      q.attributes = filters.$select;
    +      q.attributes = filters.$select.map(select => `${select}`);
         }
     
         const Model = this.applyScope(params);
    
  • test/index.test.js+6 0 modified
    @@ -293,6 +293,12 @@ describe('Feathers Sequelize Service', () => {
             await people.remove(person.id);
           });
     
    +      it('does not allow raw attribute $select ', async () => {
    +        await assert.rejects(() => people.find({
    +          query: { $select: [['(sqlite_version())', 'x']] }
    +        }));
    +      });
    +
           it('hides the Sequelize error in ERROR symbol', async () => {
             try {
               await people.create({
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.