{"id":"EEF-CVE-2026-32687","summary":"SQL injection via channel name in Postgrex.Notifications.listen/3 and unlisten/3","details":"## Summary\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in elixir-ecto postgrex ('Elixir.Postgrex.Notifications' module) allows SQL Injection.\n\nThe channel argument passed to 'Elixir.Postgrex.Notifications':listen/3 and 'Elixir.Postgrex.Notifications':unlisten/3 is interpolated directly into LISTEN \"...\" / UNLISTEN \"...\" SQL statements without escaping the \" character. An attacker who can influence the channel name can inject a \" to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect.\n\nThis vulnerability is associated with program file lib/postgrex/notifications.ex and program routines 'Elixir.Postgrex.Notifications':listen/3, 'Elixir.Postgrex.Notifications':unlisten/3, 'Elixir.Postgrex.Notifications':handle_connect/1.\n\nThis issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.\n\n## Configuration\n\nThe application must call 'Elixir.Postgrex.Notifications':listen/3 or 'Elixir.Postgrex.Notifications':unlisten/3 with a channel name derived from untrusted user input.","aliases":["CVE-2026-32687","GHSA-r73h-97w8-m54h"],"modified":"2026-05-12T14:41:27.353407213Z","published":"2026-05-12T14:18:07.607Z","database_specific":{"cpe_ids":["cpe:2.3:a:elixir-ecto:postgrex:*:*:*:*:*:*:*:*"],"cwe_ids":["CWE-89"],"capec_ids":["CAPEC-66"]},"references":[{"type":"ADVISORY","url":"https://github.com/elixir-ecto/ecto/security/advisories/GHSA-r73h-97w8-m54h"},{"type":"WEB","url":"https://cna.erlef.org/cves/CVE-2026-32687.html"},{"type":"FIX","url":"https://github.com/elixir-ecto/postgrex/commit/7cdedbd4316bb65f82e6a9a4f922c0ac491cb770"}],"affected":[{"package":{"name":"postgrex","ecosystem":"Hex","purl":"pkg:hex/postgrex"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.16.0"},{"fixed":"0.22.2"}]}],"versions":["0.16.0","0.16.1","0.16.2","0.16.3","0.16.4","0.16.5","0.17.0","0.17.1","0.17.2","0.17.3","0.17.4","0.17.5","0.18.0","0.19.0","0.19.1","0.19.2","0.19.3","0.20.0","0.21.0","0.21.1","0.22.0","0.22.1"],"database_specific":{"source":"https://cna.erlef.org/osv/EEF-CVE-2026-32687.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/elixir-ecto/postgrex.git","events":[{"introduced":"266b530faf9bde094e31e0e4ab851f933fadc0f5"},{"fixed":"7cdedbd4316bb65f82e6a9a4f922c0ac491cb770"}]}],"versions":["v0.16.0","v0.16.1","v0.16.2","v0.16.3","v0.16.4","v0.16.5","v0.17.0","v0.17.1","v0.17.2","v0.17.3","v0.17.4","v0.17.5","v0.18.0","v0.19.0","v0.19.1","v0.19.2","v0.19.3","v0.20.0","v0.21.0","v0.21.1","v0.22.1"],"database_specific":{"source":"https://cna.erlef.org/osv/EEF-CVE-2026-32687.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"credits":[{"name":"Peter Ullrich","type":"FINDER"}]}