npm package
sequelize
pkg:npm/sequelize
Vulnerabilities (15)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-30951 | — | >= 6.0.0-beta.1, < 6.37.8 | 6.37.8 | Mar 10, 2026 | Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extract a cast type, which is interpolated raw into CAST(... AS ) SQL. An atta | ||
| CVE-2023-25813 | — | < 6.19.1 | 6.19.1 | Feb 22, 2023 | Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The i | ||
| CVE-2023-22579 | — | < 6.28.1 | 6.28.1 | Feb 16, 2023 | Due to improper parameter filtering in the sequalize js library, can a attacker peform injection. | ||
| CVE-2023-22578 | — | < 6.29.0 | 6.29.0 | Feb 16, 2023 | Due to improper artibute filtering in the sequalize js library, can a attacker peform SQL injections. | ||
| CVE-2023-22580 | — | < 6.28.1 | 6.28.1 | Feb 16, 2023 | Due to improper input filtering in the sequalize js library, can malicious queries lead to sensitive information disclosure. | ||
| CVE-2016-1000225 | cri | — | >= 3.4.0, < 3.23.6 | 3.23.6 | Sep 1, 2020 | Affected versions of `sequelize` are vulnerable to SQL Injection in Models that have fields with the `GEOMETRY` DataType. This vulnerability occurs because single quotes in document values are not escaped for GeoJSON documents using `ST_GeomFromGeoJSON`, and MySQL GeoJSON documen | |
| CVE-2019-10749 | — | < 3.35.1 | 3.35.1 | Oct 29, 2019 | sequelize before version 3.35.1 allows attackers to perform a SQL Injection due to the JSON path keys not being properly sanitized in the Postgres dialect. | ||
| CVE-2019-10748 | — | < 3.35.1 | 3.35.1 | Oct 28, 2019 | Sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to SQL Injection due to JSON path keys not being properly escaped for the MySQL/MariaDB dialects. | ||
| CVE-2019-10752 | — | < 4.44.3 | 4.44.3 | Oct 17, 2019 | Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite. | ||
| CVE-2019-11069 | — | >= 5.0.0, < 5.3.0 | 5.3.0 | Apr 10, 2019 | Sequelize version 5 before 5.3.0 does not properly ensure that standard conforming strings are used. | ||
| CVE-2016-10554 | — | < 1.7.0 | 1.7.0 | May 31, 2018 | sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. Before version 1.7.0-alpha3, sequelize defaulted SQLite to use MySQL backslash escaping, even though SQLite uses | ||
| CVE-2016-10553 | — | < 3.0.0 | 3.0.0 | May 31, 2018 | sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. A fix was pushed out that fixed potential SQL injection in sequelize 2.1.3 and earlier. | ||
| CVE-2016-10550 | — | < 3.17.0 | 3.17.0 | May 31, 2018 | sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. | ||
| CVE-2016-10556 | — | < 3.20.0 | 3.20.0 | May 29, 2018 | sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperl | ||
| CVE-2015-1369 | — | < 2.0.0-rc8 | 2.0.0-rc8 | Jan 27, 2015 | SQL injection vulnerability in Sequelize before 2.0.0-rc7 for Node.js allows remote attackers to execute arbitrary SQL commands via the order parameter. |
- CVE-2026-30951Mar 10, 2026affected >= 6.0.0-beta.1, < 6.37.8fixed 6.37.8
Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extract a cast type, which is interpolated raw into CAST(... AS ) SQL. An atta
- CVE-2023-25813Feb 22, 2023affected < 6.19.1fixed 6.19.1
Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The i
- CVE-2023-22579Feb 16, 2023affected < 6.28.1fixed 6.28.1
Due to improper parameter filtering in the sequalize js library, can a attacker peform injection.
- CVE-2023-22578Feb 16, 2023affected < 6.29.0fixed 6.29.0
Due to improper artibute filtering in the sequalize js library, can a attacker peform SQL injections.
- CVE-2023-22580Feb 16, 2023affected < 6.28.1fixed 6.28.1
Due to improper input filtering in the sequalize js library, can malicious queries lead to sensitive information disclosure.
- affected >= 3.4.0, < 3.23.6fixed 3.23.6
Affected versions of `sequelize` are vulnerable to SQL Injection in Models that have fields with the `GEOMETRY` DataType. This vulnerability occurs because single quotes in document values are not escaped for GeoJSON documents using `ST_GeomFromGeoJSON`, and MySQL GeoJSON documen
- CVE-2019-10749Oct 29, 2019affected < 3.35.1fixed 3.35.1
sequelize before version 3.35.1 allows attackers to perform a SQL Injection due to the JSON path keys not being properly sanitized in the Postgres dialect.
- CVE-2019-10748Oct 28, 2019affected < 3.35.1fixed 3.35.1
Sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to SQL Injection due to JSON path keys not being properly escaped for the MySQL/MariaDB dialects.
- CVE-2019-10752Oct 17, 2019affected < 4.44.3fixed 4.44.3
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
- CVE-2019-11069Apr 10, 2019affected >= 5.0.0, < 5.3.0fixed 5.3.0
Sequelize version 5 before 5.3.0 does not properly ensure that standard conforming strings are used.
- CVE-2016-10554May 31, 2018affected < 1.7.0fixed 1.7.0
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. Before version 1.7.0-alpha3, sequelize defaulted SQLite to use MySQL backslash escaping, even though SQLite uses
- CVE-2016-10553May 31, 2018affected < 3.0.0fixed 3.0.0
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. A fix was pushed out that fixed potential SQL injection in sequelize 2.1.3 and earlier.
- CVE-2016-10550May 31, 2018affected < 3.17.0fixed 3.17.0
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements.
- CVE-2016-10556May 29, 2018affected < 3.20.0fixed 3.20.0
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperl
- CVE-2015-1369Jan 27, 2015affected < 2.0.0-rc8fixed 2.0.0-rc8
SQL injection vulnerability in Sequelize before 2.0.0-rc7 for Node.js allows remote attackers to execute arbitrary SQL commands via the order parameter.