knex is vulnerable to SQL Injection
82
High Risk
Affected versions of this package are vulnerable to SQL injection due to improper handling of inputs passed to search_path for Postgres dialect. The affected logic allows user-controlled values to be treated as column or table identifiers without enforcing strict validation or escaping, causing them to be interpolated directly into generated SQL. An attacker able to influence these identifier parameters can inject crafted SQL fragments that alter query structure, potentially bypassing intended conditions or executing unintended database operations.
You are affected if you are using a version that falls within the vulnerable range and you are using a Postgres database.
knex is vulnerable to SQL Injection in versions 0.0.1 - 3.2.8.
Upgrade the knex library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant