SQL Injection Affecting drizzle-orm package, versions >=1.0.0-beta.2-e93475f <1.0.0-beta.20-91f355e>=0.37.0 <0.45.2


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (14th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-DRIZZLEORM-16000009
  • published13 Apr 2026
  • disclosed8 Apr 2026
  • creditEthanKim88, 0x90sh, wgoodall01

Introduced: 8 Apr 2026

NewCVE-2026-39356  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade drizzle-orm to version 1.0.0-beta.20-91f355e, 0.45.2 or higher.

Overview

drizzle-orm is a Drizzle ORM package for SQL databases

Affected versions of this package are vulnerable to SQL Injection through the escapeName handling in the PostgreSQL, SQLite, and SingleStore dialects. An attacker can inject arbitrary SQL by supplying a malicious identifier to sql.identifier() or sql.as(), causing generated queries to break out of the quoted name and execute attacker-controlled SQL. This affects applications that build SELECT, ORDER BY, INSERT, UPDATE, or migration statements from untrusted table, column, or alias names. In the worst case, if the application user has write and execute privileges, this could allow code execution.

CVSS Base Scores

version 4.0
version 3.1