{"id":"CVE-2026-34220","summary":"MikroORM is vulnerable to SQL Injection via specially crafted object","details":"MikroORM is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and Identity Map patterns. Prior to versions 6.6.10 and 7.0.6, there is a SQL injection vulnerability when specially crafted objects are interpreted as raw SQL query fragments. This issue has been patched in versions 6.6.10 and 7.0.6.","aliases":["GHSA-gwhv-j974-6fxm"],"modified":"2026-04-10T05:43:23.412744Z","published":"2026-03-31T15:19:08.520Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34220.json","cwe_ids":["CWE-89"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34220.json"},{"type":"ADVISORY","url":"https://github.com/mikro-orm/mikro-orm/security/advisories/GHSA-gwhv-j974-6fxm"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34220"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mikro-orm/mikro-orm","events":[{"introduced":"0"},{"fixed":"a55e6f21abf0f8c5a7d7d49b5c3b78498023fc7b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.6.10"}]}},{"type":"GIT","repo":"https://github.com/mikro-orm/mikro-orm","events":[{"introduced":"a2330d20c18a6f1416bc4b90fd26acf3b5896fea"},{"fixed":"9a855e0f55d16f42761e9a0d05040643be5867f6"}],"database_specific":{"versions":[{"introduced":"7.0.0-rc.0"},{"fixed":"7.0.6"}]}}],"versions":["v0.0.2","v0.1.0","v0.1.1","v0.10.0","v0.10.1","v0.10.2","v0.10.3","v0.10.4","v0.10.5","v0.10.6","v0.10.7","v0.10.8","v0.10.9","v0.2.0","v0.2.1","v0.2.2","v0.2.3","v0.3.0","v0.3.1","v0.3.2","v0.3.4","v0.3.5","v0.4.0","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.6.4","v0.6.5","v0.6.6","v0.6.7","v0.6.8","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.8.0","v0.8.1","v0.8.2","v0.9.0","v0.9.1","v0.9.2","v0.9.3","v0.9.4","v0.9.5","v0.9.6","v0.9.7","v0.9.8","v0.9.9","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.1.0","v1.1.1","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v2.0.0","v2.0.0-rc","v2.0.1","v2.0.2","v2.0.3","v2.1.0","v2.1.1","v2.2.0","v2.2.1","v2.2.2","v2.3.0","v2.3.1","v2.3.2","v2.4.0","v2.5.0","v2.6.0","v2.7.0","v2.7.1","v2.7.2","v2.7.3","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.7.9","v3.0.0","v3.0.0-rc","v3.0.1","v3.1.0","v3.1.1","v3.2.0","v3.2.1","v3.3.0","v3.3.1","v3.3.2","v3.3.3","v3.3.4","v3.3.5","v3.3.6","v3.4.0","v3.4.1","v3.5.0","v3.5.1","v3.5.2","v3.6.0","v3.6.1","v3.6.10","v3.6.12","v3.6.13","v3.6.14","v3.6.15","v3.6.2","v3.6.3","v3.6.4","v3.6.5","v3.6.6","v3.6.7","v3.6.8","v3.6.9","v4.0.0","v4.0.1","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.6","v4.0.7","v4.1.0","v4.1.1","v4.2.0","v4.2.1","v4.2.2","v4.2.3","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.3.4","v4.4.0","v4.4.1","v4.4.2","v4.4.3","v4.4.4","v4.5.0","v4.5.1","v4.5.2","v4.5.3","v5.0.0","v5.0.1","v5.0.2","v5.0.3","v5.0.4","v5.0.5","v5.1.0","v5.1.1","v5.1.2","v5.1.3","v5.1.4","v5.1.5","v5.2.0","v5.2.1","v5.2.2","v5.2.3","v5.2.4","v5.3.0","v5.3.1","v5.4.0","v5.4.1","v5.4.2","v5.5.0","v5.5.1","v5.5.2","v5.5.3","v5.6.0","v5.6.1","v5.6.10","v5.6.11","v5.6.12","v5.6.13","v5.6.14","v5.6.15","v5.6.16","v5.6.2","v5.6.3","v5.6.4","v5.6.5","v5.6.6","v5.6.7","v5.6.8","v5.6.9","v5.7.0","v5.7.1","v5.7.10","v5.7.11","v5.7.12","v5.7.13","v5.7.14","v5.7.2","v5.7.3","v5.7.4","v5.7.5","v5.7.6","v5.7.7","v5.7.8","v5.7.9","v5.8.0","v5.8.1","v5.8.10","v5.8.2","v5.8.3","v5.8.4","v5.8.5","v5.8.6","v5.8.7","v5.8.8","v5.8.9","v5.9.0","v5.9.1","v5.9.2","v6.0.0","v6.0.1","v6.0.2","v6.0.3","v6.0.4","v6.0.5","v6.0.6","v6.0.7","v6.1.0","v6.1.1","v6.1.10","v6.1.11","v6.1.12","v6.1.2","v6.1.3","v6.1.4","v6.1.5","v6.1.6","v6.1.7","v6.1.8","v6.1.9","v6.2.0","v6.2.1","v6.2.2","v6.2.3","v6.2.4","v6.2.5","v6.2.6","v6.2.7","v6.2.8","v6.2.9","v6.3.0","v6.3.1","v6.3.10","v6.3.11","v6.3.12","v6.3.13","v6.3.2","v6.3.3","v6.3.4","v6.3.5","v6.3.6","v6.3.7","v6.3.8","v6.3.9","v6.4.0","v6.4.1","v6.4.10","v6.4.11","v6.4.12","v6.4.13","v6.4.14","v6.4.15","v6.4.16","v6.4.2","v6.4.3","v6.4.4","v6.4.5","v6.4.6","v6.4.7","v6.4.8","v6.4.9","v6.5.0","v6.5.1","v6.5.2","v6.5.3","v6.5.4","v6.5.5","v6.5.6","v6.5.7","v6.5.8","v6.5.9","v6.6.0","v6.6.1","v6.6.2","v6.6.3","v6.6.4","v6.6.5","v6.6.6","v6.6.7","v6.6.8","v6.6.9","v7.0.0","v7.0.0-rc.0","v7.0.0-rc.1","v7.0.0-rc.2","v7.0.0-rc.3","v7.0.1","v7.0.2","v7.0.3","v7.0.4","v7.0.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-34220.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"}]}