{"affected":[{"package":{"ecosystem":"Hex","name":"postgrex","purl":"pkg:hex/postgrex"},"ranges":[{"events":[{"introduced":"0.16.0"},{"fixed":"0.22.2"}],"type":"SEMVER"}],"versions":["0.16.0","0.16.1","0.16.2","0.16.3","0.16.4","0.16.5","0.17.0","0.17.1","0.17.2","0.17.3","0.17.4","0.17.5","0.18.0","0.19.0","0.19.1","0.19.2","0.19.3","0.20.0","0.21.0","0.21.1","0.22.0","0.22.1"]},{"ranges":[{"events":[{"introduced":"266b530faf9bde094e31e0e4ab851f933fadc0f5"},{"fixed":"7cdedbd4316bb65f82e6a9a4f922c0ac491cb770"}],"repo":"https://github.com/elixir-ecto/postgrex.git","type":"GIT"}]}],"aliases":["GHSA-r73h-97w8-m54h","CVE-2026-32687"],"credits":[{"name":"Peter Ullrich","type":"FINDER"}],"database_specific":{"capec_ids":["CAPEC-66"],"cpe_ids":["cpe:2.3:a:elixir-ecto:postgrex:*:*:*:*:*:*:*:*"],"cwe_ids":["CWE-89"]},"details":"## Summary\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in elixir-ecto postgrex ('Elixir.Postgrex.Notifications' module) allows SQL Injection.\n\nThe channel argument passed to 'Elixir.Postgrex.Notifications':listen/3 and 'Elixir.Postgrex.Notifications':unlisten/3 is interpolated directly into LISTEN \"...\" / UNLISTEN \"...\" SQL statements without escaping the \" character. An attacker who can influence the channel name can inject a \" to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect.\n\nThis vulnerability is associated with program file lib/postgrex/notifications.ex and program routines 'Elixir.Postgrex.Notifications':listen/3, 'Elixir.Postgrex.Notifications':unlisten/3, 'Elixir.Postgrex.Notifications':handle_connect/1.\n\nThis issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.\n\n## Configuration\n\nThe application must call 'Elixir.Postgrex.Notifications':listen/3 or 'Elixir.Postgrex.Notifications':unlisten/3 with a channel name derived from untrusted user input.","id":"EEF-CVE-2026-32687","modified":"2026-05-12T14:20:21.684Z","published":"2026-05-12T14:18:07.607Z","references":[{"type":"ADVISORY","url":"https://github.com/elixir-ecto/ecto/security/advisories/GHSA-r73h-97w8-m54h"},{"type":"WEB","url":"https://cna.erlef.org/cves/CVE-2026-32687.html"},{"type":"FIX","url":"https://github.com/elixir-ecto/postgrex/commit/7cdedbd4316bb65f82e6a9a4f922c0ac491cb770"}],"related":[],"schema_version":"1.7.3","severity":[{"score":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"}],"summary":"SQL injection via channel name in Postgrex.Notifications.listen/3 and unlisten/3","upstream":[]}