We found results for “”
CVE-2026-22814
Good to know:
Date: January 13, 2026
@adonisjs/lucid is an SQL ORM for AdonisJS built on top of Knex. Prior to 21.8.2 and 22.0.0-next.6, there is a Mass Assignment vulnerability in AdonisJS Lucid which may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may lead to logic bypasses and unauthorized record modification within a table or model. This affects @adonisjs/lucid through version 21.8.1 and 22.x pre-release versions prior to 22.0.0-next.6. This has been patched in @adonisjs/lucid versions 21.8.2 and 22.0.0-next.6.
Severity Score
Severity Score
Weakness Type (CWE)
Improperly Controlled Modification of Dynamically-Determined Object Attributes
CWE-915Top Fix
Upgrade Version
Upgrade to version @adonisjs/lucid - 21.8.2;@adonisjs/lucid - 22.0.0-next.6;https://github.com/adonisjs/lucid.git - v22.0.0-next.6;https://github.com/adonisjs/lucid.git - v21.8.2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


