<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Drizzle-Orm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/drizzle-orm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/drizzle-orm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Drizzle ORM SQL Injection Vulnerability (CVE-2026-39356)</title><link>https://feed.craftedsignal.io/briefs/2026-04-drizzle-sql-injection/</link><pubDate>Wed, 08 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-drizzle-sql-injection/</guid><description>Drizzle ORM versions before 0.45.2 and 1.0.0-beta.20 are vulnerable to SQL injection due to improper escaping of SQL identifiers, allowing attackers to inject malicious SQL code through manipulated input leading to potential data breaches.</description><content:encoded><![CDATA[<p>Drizzle ORM, a TypeScript ORM, contains a SQL injection vulnerability (CVE-2026-39356) in versions prior to 0.45.2 and 1.0.0-beta.20. The vulnerability stems from improper escaping of quoted SQL identifiers within the <code>escapeName()</code> implementations. Specifically, embedded identifier delimiters were not properly escaped before being enclosed in quotes or backticks. This allows attackers to inject arbitrary SQL code by manipulating input passed to APIs like <code>sql.identifier()</code> or <code>.as()</code> which are used to construct SQL identifiers or aliases. Successful exploitation could lead to unauthorized data access, modification, or other database manipulation. Organizations using affected versions of Drizzle ORM are at risk. This issue is resolved in versions 0.45.2 and 1.0.0-beta.20.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an application using a vulnerable version of Drizzle ORM (prior to 0.45.2 or 1.0.0-beta.20).</li>
<li>Attacker locates input fields or API endpoints that utilize <code>sql.identifier()</code> or <code>.as()</code> to construct SQL queries.</li>
<li>Attacker crafts malicious input containing embedded identifier delimiters (e.g., quotes or backticks) and SQL code.</li>
<li>The application passes the attacker-controlled input to <code>sql.identifier()</code> or <code>.as()</code> without proper sanitization.</li>
<li>Drizzle ORM&rsquo;s vulnerable <code>escapeName()</code> function fails to properly escape the malicious delimiters.</li>
<li>The crafted SQL identifier is incorporated into a larger SQL query.</li>
<li>The application executes the compromised SQL query against the database.</li>
<li>The injected SQL code executes, allowing the attacker to perform unauthorized actions such as data exfiltration or modification.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39356 allows attackers to inject arbitrary SQL queries into the application&rsquo;s database interactions. This can lead to sensitive data exposure, unauthorized data modification or deletion, and potentially full database compromise. The severity of the impact depends on the application&rsquo;s database permissions and the sensitivity of the data stored within. Organizations in all sectors utilizing vulnerable Drizzle ORM versions are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Drizzle ORM to version 0.45.2 or 1.0.0-beta.20 to remediate CVE-2026-39356.</li>
<li>Implement robust input validation and sanitization on all user-supplied input that is used in SQL queries, even after upgrading Drizzle ORM.</li>
<li>Deploy the Sigma rule &ldquo;Detect Drizzle ORM SQL Injection Attempt&rdquo; to identify exploitation attempts in your environment.</li>
<li>Monitor web server logs for suspicious patterns in HTTP requests indicative of SQL injection attempts (cs-uri-query, cs-uri-stem log fields).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>drizzle-orm</category><category>cve-2026-39356</category><category>typescript</category><category>orm</category></item></channel></rss>