CVE-2026-32687
SQL injection via channel name in Postgrex.Notifications.listen/3 and unlisten/3
Weakness Type (CWE)
CWE-89 — CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Vulnerability description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in elixir-ecto postgrex ('Elixir.Postgrex.Notifications' module) allows SQL Injection.The channel argument passed to 'Elixir.Postgrex.Notifications':listen/3 and 'Elixir.Postgrex.Notifications':unlisten/3 is interpolated directly into LISTEN "..." / UNLISTEN "..." SQL statements without escaping the " character. An attacker who can influence the channel name can inject a " to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect.
This vulnerability is associated with program file lib/postgrex/notifications.ex and program routines 'Elixir.Postgrex.Notifications':listen/3, 'Elixir.Postgrex.Notifications':unlisten/3, 'Elixir.Postgrex.Notifications':handle_connect/1.
This issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.
Affected
pkg:hex/postgrex
| Module | Source File | Routine |
|---|---|---|
Postgrex.Notifications
|
lib/postgrex/notifications.ex
|
Postgrex.Notifications.listen/3
|
Postgrex.Notifications.unlisten/3
|
||
Postgrex.Notifications.handle_connect/1
|
pkg:github/elixir-ecto/postgrex
| Module | Source File | Routine |
|---|---|---|
Postgrex.Notifications
|
lib/postgrex/notifications.ex
|
Postgrex.Notifications.listen/3
|
Postgrex.Notifications.unlisten/3
|
||
Postgrex.Notifications.handle_connect/1
|
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | git ⓘ | 266b530faf
|
< 7cdedbd431
|
Configurations
The application must call 'Elixir.Postgrex.Notifications':listen/3 or 'Elixir.Postgrex.Notifications':unlisten/3 with a channel name derived from untrusted user input.
References
- https://github.com/elixir-ecto/ecto/security/advisories/GHSA-r73h-97w8-m54h vendor-advisory related
- https://osv.dev/vulnerability/EEF-CVE-2026-32687 related
- https://github.com/elixir-ecto/postgrex/commit/7cdedbd4316bb65f82e6a9a4f922c0ac491cb770 patch
Credits
- Finder: Peter Ullrich
CVE record as JSON:
GET /cves/CVE-2026-32687.json
OSV record as JSON:
GET /osv/EEF-CVE-2026-32687.json