SQL Injection Affecting @mikro-orm/core package, versions <6.6.10-dev.1>=7.0.0-dev.0 <7.0.6-dev.8


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-MIKROORMCORE-15916609
  • published6 Apr 2026
  • disclosed29 Mar 2026
  • creditlukas-eu

Introduced: 29 Mar 2026

NewCVE-2026-34220  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade @mikro-orm/core to version 6.6.10-dev.1, 7.0.6-dev.8 or higher.

Overview

@mikro-orm/core is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and Identity Map patterns. Supports MongoDB, MySQL, PostgreSQL and SQLite databases as well as usage with vanilla JavaScript.

Affected versions of this package are vulnerable to SQL Injection via the interpretation of specially crafted objects as raw SQL query fragments in ORM write APIs such as wrap(entity).assign(userInput) followed by em.flush(), em.nativeUpdate(), em.nativeInsert(), or em.create() followed by em.flush(). An attacker can execute arbitrary SQL commands by supplying malicious input to these APIs.

CVSS Base Scores

version 4.0
version 3.1