CVE-2026-32763
March 19, 2026
Kysely is a type-safe TypeScript SQL query builder. Versions up to and including 0.28.11 has a SQL injection vulnerability in JSON path compilation for MySQL and SQLite dialects. The "visitJSONPathLeg()" function appends user-controlled values from ".key()" and ".at()" directly into single-quoted JSON path string literals ("'$.key'") without escaping single quotes. An attacker can break out of the JSON path string context and inject arbitrary SQL. This is inconsistent with "sanitizeIdentifier()", which properly doubles delimiter characters for identifiers — both are non-parameterizable SQL constructs requiring manual escaping, but only identifiers are protected. Version 0.28.12 fixes the issue.
Affected Packages
https://github.com/kysely-org/kysely.git (GITHUB):
Affected version(s) >=v0.28.3 <v0.28.12Fix Suggestion:
Update to version v0.28.12kysely (NPM):
Affected version(s) >=0.26.0 <0.28.12Fix Suggestion:
Update to version 0.28.12Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.8
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.2
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
EPSS
Base Score:
0.02