<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kysely — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/kysely/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 17:16:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/kysely/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kysely SQL Injection Vulnerability (CVE-2026-33468)</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-kysely-sql-injection/</link><pubDate>Thu, 26 Mar 2026 17:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-kysely-sql-injection/</guid><description>A SQL injection vulnerability exists in Kysely versions prior to 0.28.14 due to insufficient backslash escaping in the `DefaultQueryCompiler.sanitizeStringLiteral()` function, potentially allowing attackers to inject arbitrary SQL when using the MySQL dialect, specifically affecting `CreateIndexBuilder.where()` and `CreateViewBuilder.as()` methods.</description><content:encoded><![CDATA[<p>Kysely, a type-safe TypeScript SQL query builder, is susceptible to a SQL injection vulnerability in versions prior to 0.28.14. The vulnerability, identified as CVE-2026-33468, stems from the <code>DefaultQueryCompiler.sanitizeStringLiteral()</code> function&rsquo;s failure to properly escape backslashes. This incomplete sanitization, in conjunction with the MySQL dialect&rsquo;s default setting where <code>NO_BACKSLASH_ESCAPES</code> is OFF, enables attackers to bypass string literal contexts by injecting arbitrary SQL…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kysely</category><category>sql-injection</category><category>cve-2026-33468</category></item><item><title>SQL Injection Vulnerability in Kysely TypeScript Library (CVE-2026-33442)</title><link>https://feed.craftedsignal.io/briefs/2026-03-kysely-sql-injection/</link><pubDate>Thu, 26 Mar 2026 17:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-kysely-sql-injection/</guid><description>Kysely versions 0.28.12 and 0.28.13 are vulnerable to SQL injection due to insufficient escaping of backslashes in the `sanitizeStringLiteral` method, potentially leading to arbitrary SQL execution on MySQL servers.</description><content:encoded><![CDATA[<p>Kysely, a type-safe TypeScript SQL query builder, is susceptible to a SQL injection vulnerability identified as CVE-2026-33442. The vulnerability resides in the <code>sanitizeStringLiteral</code> method of the query compiler within versions 0.28.12 and 0.28.13. The method inadequately handles backslashes, failing to escape them, while properly escaping single quotes. On MySQL servers configured with the default <code>BACKSLASH_ESCAPES</code> SQL mode enabled, this oversight allows an attacker to inject a backslash…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>kysely</category><category>cve-2026-33442</category></item></channel></rss>