CVE-2026-33468 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 26, 2026
Kysely - SQL Injection
Overview
Kysely < 0.28.14 contains a SQL injection caused by improper escaping of backslashes in string literals in DefaultQueryCompiler.sanitizeStringLiteral(), letting attackers inject arbitrary SQL via ImmediateValueTransformer in MySQL dialect, exploit requires crafted input.
Severity & Score
Impact
Attackers can inject arbitrary SQL commands, potentially leading to data leakage, modification, or full database compromise.
Mitigation
Upgrade to version 0.28.14 or later.
Social Media Activity(1 post)
š CVE-2026-33468 - High (8.1) Kysely is a type-safe TypeScript SQL query builder. Prior to version 0.28.14, Kysely's `DefaultQueryCompiler.sanitizeStringLiteral()` only escapes single quotes by doubling them (`'` ā `''`) but does not escape backslashes. When used with the My... š https://www.thehackerwire.com/vulnerability/CVE-2026-33468/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33468
- Severity
- High
- CVSS Score
- 8.1
- Type
- sql_injection
- Status
- new
- EPSS
- 4.8%
- Social Posts
- 1
CWE
- CWE-89
CVSS Metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H