CVE-2023-22579
JavaScript vulnerability analysis and mitigation

Overview

CVE-2023-22579 is a critical vulnerability in the Sequelize JavaScript library, discovered and disclosed in early 2023. This vulnerability is characterized by improper parameter filtering and type confusion issues, affecting multiple versions of the Sequelize ORM tool, which is widely used for database operations with various database systems including Postgres, MySQL, MariaDB, SQLite, and others. The vulnerability has been assigned a CVSS score of 9.9, indicating its critical severity (Security Online).

Technical details

The vulnerability is described as an 'Access of Resource Using Incompatible Type (Type Confusion)' flaw that occurs due to improper user-input sanitization, specifically related to unsafe fall-through in GET WHERE conditions. The issue affects Sequelize versions prior to 7.0.0-alpha.20 and 6.28.1 (Security Online).

Impact

Due to the critical nature of this vulnerability and its high CVSS score of 9.9, the impact is severe as it could potentially allow attackers to perform SQL injection attacks through improper parameter filtering. This could lead to unauthorized database access and manipulation in applications using affected versions of Sequelize (Security Online).

Mitigation and workarounds

The vulnerability has been addressed in Sequelize versions 7.0.0-alpha.20 and 6.28.1. Users are strongly recommended to update to these or later versions to mitigate the security risk. The fix was released to address the unsafe fall-through in GET WHERE conditions and improve user-input sanitization (Security Online).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66456CRITICAL9.1
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-66457HIGH7.5
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-65849MEDIUM6.9
  • JavaScriptJavaScript
  • altcha
NoNoDec 08, 2025
CVE-2025-66202MEDIUM6.5
  • JavaScriptJavaScript
  • astro
NoYesDec 09, 2025
CVE-2025-14284MEDIUM5.1
  • JavaScriptJavaScript
  • @tiptap/extension-link
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management