Intel

AIKIDO-2026-10508

@nuxt/content is vulnerable to SQL Injection

SQL Injection Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

81

High Risk

This Affects:

JS@nuxt/content
3.2.0 - 3.12.0
Fixed in 3.13.0
Are you affected? Scan for Free

TL;DR

Affected versions of this package allowed overly permissive COUNT(*) query patterns, where the validation regex was not anchored and did not enforce the expected as count alias, potentially letting crafted SQL fragments bypass the intended format restriction. An attacker able to influence the counted expression could abuse this weak validation to inject or append unintended SQL into count-based queries, which may lead to query manipulation, authorization bypass in query-building logic, or exposure of unintended database behavior.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

@nuxt/content is vulnerable to SQL Injection in versions 3.2.0 - 3.12.0.

How to fix this

Upgrade the @nuxt/content library to the patch version.