
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-22579 is a critical vulnerability in the Sequelize JavaScript library, discovered and disclosed in early 2023. This vulnerability is characterized by improper parameter filtering and type confusion issues, affecting multiple versions of the Sequelize ORM tool, which is widely used for database operations with various database systems including Postgres, MySQL, MariaDB, SQLite, and others. The vulnerability has been assigned a CVSS score of 9.9, indicating its critical severity (Security Online).
The vulnerability is described as an 'Access of Resource Using Incompatible Type (Type Confusion)' flaw that occurs due to improper user-input sanitization, specifically related to unsafe fall-through in GET WHERE conditions. The issue affects Sequelize versions prior to 7.0.0-alpha.20 and 6.28.1 (Security Online).
Due to the critical nature of this vulnerability and its high CVSS score of 9.9, the impact is severe as it could potentially allow attackers to perform SQL injection attacks through improper parameter filtering. This could lead to unauthorized database access and manipulation in applications using affected versions of Sequelize (Security Online).
The vulnerability has been addressed in Sequelize versions 7.0.0-alpha.20 and 6.28.1. Users are strongly recommended to update to these or later versions to mitigate the security risk. The fix was released to address the unsafe fall-through in GET WHERE conditions and improve user-input sanitization (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."