Home

Description

@adonisjs/lucid is an SQL ORM for AdonisJS built on top of Knex. Prior to 21.8.2 and 22.0.0-next.6, there is a Mass Assignment vulnerability in AdonisJS Lucid which may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may lead to logic bypasses and unauthorized record modification within a table or model. This affects @adonisjs/lucid through version 21.8.1 and 22.x pre-release versions prior to 22.0.0-next.6. This has been patched in @adonisjs/lucid versions 21.8.2 and 22.0.0-next.6.

PUBLISHED Reserved 2026-01-09 | Published 2026-01-13 | Updated 2026-01-14 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

< 21.8.2
affected

>= 22.0.0-next.0, < 22.0.0-next.6
affected

References

github.com/.../lucid/security/advisories/GHSA-g5gc-h5hp-555f

cve.org (CVE-2026-22814)

nvd.nist.gov (CVE-2026-22814)

Download JSON