CVE-2026-4190
Description
A vulnerability was detected in JawherKl node-api-postgres up to 2.5. This impacts the function User.getAll of the file models/user.js. The manipulation of the argument sort results in sql injection. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE
- CWE-89 — SQL Injection
- CWE-74 — Injection
Affected
- JawherKl / node-api-postgres — v=2.0 [affected]; v=2.1 [affected]; v=2.2 [affected]; v=2.3 [affected]; v=2.4 [affected]; v=2.5 [affected]
CVSS
- 4.0 score=6.9 severity=MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P - 3.1 score=7.3 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R - 3.0 score=7.3 severity=HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R - 2.0 score=7.5 severity=
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR
References
- https://vuldb.com/?id.351097 vdb-entry, technical-description
- https://vuldb.com/?ctiid.351097 signature, permissions-required
- https://vuldb.com/?submit.770001 third-party-advisory
- https://hackmd.io/@YzU_KiOzT86cEbFQdBceVg/Bk56LQQYbe exploit
Source
cvelistV5-main/cves/2026/4xxx/CVE-2026-4190.json