top of page
perceptive_background_267k.jpg

Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific escapeName(…

Published:

6 april 2026 om 22:00:00

Alert date:

7 april 2026 om 21:03:21

Source:

nvd.nist.gov

Click to open the original link from this advisory

Database & Storage, Web Technologies, Supply Chain & Dependencies

Drizzle ORM, a modern TypeScript ORM, contains a SQL injection vulnerability in versions prior to 0.45.2 and 1.0.0-beta.20. The vulnerability stems from improper escaping of quoted SQL identifiers in dialect-specific escapeName() implementations. Attackers can exploit this by passing malicious input to APIs that construct SQL identifiers or aliases, such as sql.identifier() and .as(). The flaw allows attackers to terminate quoted identifiers and inject arbitrary SQL code. This affects applications that use attacker-controlled input in SQL identifier construction. The vulnerability has been patched in versions 0.45.2 and 1.0.0-beta.20.

Technical details

Mitigation steps:

Affected products:

Drizzle ORM

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page