Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade kysely to version 0.28.17 or higher.
kysely is a Type safe SQL query builder
Affected versions of this package are vulnerable to SQL Injection via the visitJSONPathLeg function, which appends user-controlled values from .key() and .at() directly into single-quoted JSON path string literals without proper escaping. An attacker can inject arbitrary SQL by crafting input that breaks out of the JSON path string context.
Note: This is a bypass of the fix for the vulnerability described in CVE-2026-32763, which only escapes quote characters but not ., [, ], *, **, and ?.