EEF-CVE-2026-32687

Source
https://cna.erlef.org/osv/EEF-CVE-2026-32687.html
Import Source
https://cna.erlef.org/osv/EEF-CVE-2026-32687.json
JSON Data
https://api.osv.dev/v1/vulns/EEF-CVE-2026-32687
Aliases
  • CVE-2026-32687
  • GHSA-r73h-97w8-m54h
Published
2026-05-12T14:18:07.607Z
Modified
2026-05-12T14:41:27.353407213Z
Severity
  • 7.5 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
SQL injection via channel name in Postgrex.Notifications.listen/3 and unlisten/3
Details

Summary

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in elixir-ecto postgrex ('Elixir.Postgrex.Notifications' module) allows SQL Injection.

The channel argument passed to 'Elixir.Postgrex.Notifications':listen/3 and 'Elixir.Postgrex.Notifications':unlisten/3 is interpolated directly into LISTEN "..." / UNLISTEN "..." SQL statements without escaping the " character. An attacker who can influence the channel name can inject a " to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect.

This vulnerability is associated with program file lib/postgrex/notifications.ex and program routines 'Elixir.Postgrex.Notifications':listen/3, 'Elixir.Postgrex.Notifications':unlisten/3, 'Elixir.Postgrex.Notifications':handle_connect/1.

This issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.

Configuration

The application must call 'Elixir.Postgrex.Notifications':listen/3 or 'Elixir.Postgrex.Notifications':unlisten/3 with a channel name derived from untrusted user input.

Database specific
{
    "capec_ids": [
        "CAPEC-66"
    ],
    "cpe_ids": [
        "cpe:2.3:a:elixir-ecto:postgrex:*:*:*:*:*:*:*:*"
    ],
    "cwe_ids": [
        "CWE-89"
    ]
}
References
Credits
    • Peter Ullrich - FINDER

Affected packages

Hex / postgrex

Package

Name
postgrex
Purl
pkg:hex/postgrex

Affected ranges

Type
SEMVER
Events
Introduced
0.16.0
Fixed
0.22.2

Affected versions

0.*
0.16.0
0.16.1
0.16.2
0.16.3
0.16.4
0.16.5
0.17.0
0.17.1
0.17.2
0.17.3
0.17.4
0.17.5
0.18.0
0.19.0
0.19.1
0.19.2
0.19.3
0.20.0
0.21.0
0.21.1
0.22.0
0.22.1

Database specific

source
"https://cna.erlef.org/osv/EEF-CVE-2026-32687.json"

Git / github.com/elixir-ecto/postgrex.git

Affected ranges

Type
GIT
Repo
https://github.com/elixir-ecto/postgrex.git
Events

Affected versions

v0.*
v0.16.0
v0.16.1
v0.16.2
v0.16.3
v0.16.4
v0.16.5
v0.17.0
v0.17.1
v0.17.2
v0.17.3
v0.17.4
v0.17.5
v0.18.0
v0.19.0
v0.19.1
v0.19.2
v0.19.3
v0.20.0
v0.21.0
v0.21.1
v0.22.1

Database specific

source
"https://cna.erlef.org/osv/EEF-CVE-2026-32687.json"