CVE-2026-33442 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 26, 2026
Kysely - SQL Injection
Overview
Kysely 0.28.12 and 0.28.13 contain a SQL injection caused by improper escaping of backslashes in sanitizeStringLiteral method, letting attackers inject arbitrary SQL on MySQL with default BACKSLASH_ESCAPES mode, exploit requires crafted input.
Severity & Score
Impact
Attackers can inject arbitrary SQL commands, potentially leading to data compromise or full database control.
Mitigation
Upgrade to version 0.28.14 or later.
Social Media Activity(1 post)
š CVE-2026-33442 - High (8.1) Kysely is a type-safe TypeScript SQL query builder. In versions 0.28.12 and 0.28.13, the `sanitizeStringLiteral` method in Kysely's query compiler escapes single quotes (`'` ā `''`) but does not escape backslashes. On MySQL with the default `BAC... š https://www.thehackerwire.com/vulnerability/CVE-2026-33442/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33442
- Severity
- High
- CVSS Score
- 8.1
- Type
- sql_injection
- Status
- new
- EPSS
- 4.8%
- Social Posts
- 1
CWE
- CWE-89
CVSS Metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H