{"containers":{"cna":{"affected":[{"collectionURL":"https://hex.pm/packages","cpes":["cpe:2.3:a:elixir-ecto:postgrex:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","modules":["'Elixir.Postgrex.Notifications'"],"packageName":"postgrex","packageURL":"pkg:hex/postgrex","product":"postgrex","programFiles":["lib/postgrex/notifications.ex"],"programRoutines":[{"name":"'Elixir.Postgrex.Notifications':listen/3"},{"name":"'Elixir.Postgrex.Notifications':unlisten/3"},{"name":"'Elixir.Postgrex.Notifications':handle_connect/1"}],"repo":"https://github.com/elixir-ecto/postgrex.git","vendor":"elixir-ecto","versions":[{"lessThan":"0.22.2","status":"affected","version":"0.16.0","versionType":"semver"}]},{"collectionURL":"https://github.com","cpes":["cpe:2.3:a:elixir-ecto:postgrex:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","modules":["'Elixir.Postgrex.Notifications'"],"packageName":"elixir-ecto/postgrex","packageURL":"pkg:github/elixir-ecto/postgrex","product":"postgrex","programFiles":["lib/postgrex/notifications.ex"],"programRoutines":[{"name":"'Elixir.Postgrex.Notifications':listen/3"},{"name":"'Elixir.Postgrex.Notifications':unlisten/3"},{"name":"'Elixir.Postgrex.Notifications':handle_connect/1"}],"repo":"https://github.com/elixir-ecto/postgrex.git","vendor":"elixir-ecto","versions":[{"lessThan":"7cdedbd4316bb65f82e6a9a4f922c0ac491cb770","status":"affected","version":"266b530faf9bde094e31e0e4ab851f933fadc0f5","versionType":"git"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The application must call <tt>'Elixir.Postgrex.Notifications':listen/3</tt> or <tt>'Elixir.Postgrex.Notifications':unlisten/3</tt> with a channel name derived from untrusted user input.</p>"}],"value":"The application must call 'Elixir.Postgrex.Notifications':listen/3 or 'Elixir.Postgrex.Notifications':unlisten/3 with a channel name derived from untrusted user input."}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:elixir-ecto:postgrex:*:*:*:*:*:*:*:*","versionEndExcluding":"0.22.2","versionStartIncluding":"0.16.0","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"AND"}],"credits":[{"lang":"en","type":"finder","value":"Peter Ullrich"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in elixir-ecto postgrex (<tt>'Elixir.Postgrex.Notifications'</tt> module) allows SQL Injection.<p>The <tt>channel</tt> argument passed to <tt>'Elixir.Postgrex.Notifications':listen/3</tt> and <tt>'Elixir.Postgrex.Notifications':unlisten/3</tt> is interpolated directly into <tt>LISTEN \"...\"</tt> / <tt>UNLISTEN \"...\"</tt> SQL statements without escaping the <tt>\"</tt> character. An attacker who can influence the channel name can inject a <tt>\"</tt> to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. <tt>; DROP TABLE ...; --</tt>). The same unsanitized interpolation also occurs in <tt>handle_connect/1</tt> when replaying LISTEN commands after a reconnect.</p><p>This vulnerability is associated with program file <tt>lib/postgrex/notifications.ex</tt> and program routines <tt>'Elixir.Postgrex.Notifications':listen/3</tt>, <tt>'Elixir.Postgrex.Notifications':unlisten/3</tt>, <tt>'Elixir.Postgrex.Notifications':handle_connect/1</tt>.</p><p>This issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.</p>"}],"value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in elixir-ecto postgrex ('Elixir.Postgrex.Notifications' module) allows SQL Injection.\n\nThe channel argument passed to 'Elixir.Postgrex.Notifications':listen/3 and 'Elixir.Postgrex.Notifications':unlisten/3 is interpolated directly into LISTEN \"...\" / UNLISTEN \"...\" SQL statements without escaping the \" character. An attacker who can influence the channel name can inject a \" to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect.\n\nThis vulnerability is associated with program file lib/postgrex/notifications.ex and program routines 'Elixir.Postgrex.Notifications':listen/3, 'Elixir.Postgrex.Notifications':unlisten/3, 'Elixir.Postgrex.Notifications':handle_connect/1.\n\nThis issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2."}],"impacts":[{"capecId":"CAPEC-66","descriptions":[{"lang":"en","value":"CAPEC-66 SQL Injection"}]}],"metrics":[{"cvssV4_0":{"attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"LOCAL","baseScore":7.5,"baseSeverity":"HIGH","privilegesRequired":"NONE","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T14:20:21.684Z","orgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","shortName":"EEF"},"references":[{"tags":["vendor-advisory","related"],"url":"https://github.com/elixir-ecto/ecto/security/advisories/GHSA-r73h-97w8-m54h"},{"tags":["related"],"url":"https://cna.erlef.org/cves/CVE-2026-32687.html"},{"tags":["related"],"url":"https://osv.dev/vulnerability/EEF-CVE-2026-32687"},{"tags":["patch"],"url":"https://github.com/elixir-ecto/postgrex/commit/7cdedbd4316bb65f82e6a9a4f922c0ac491cb770"}],"source":{"discovery":"EXTERNAL"},"title":"SQL injection via channel name in Postgrex.Notifications.listen/3 and unlisten/3","x_generator":{"engine":"cvelib 1.8.0"}}},"cveMetadata":{"assignerOrgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","assignerShortName":"EEF","cveId":"CVE-2026-32687","datePublished":"2026-05-12T14:18:07.607Z","dateReserved":"2026-03-13T09:12:14.475Z","dateUpdated":"2026-05-12T14:20:21.684Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}