Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-32687— SQL injection via channel name in Postgrex.Notifications.listen/3 and unlisten/3

AI Predicted 9.8 Difficulty: Easy EPSS 0.02% · P4

Affected Version Matrix 2

VendorProductVersion RangeStatus
elixir-ectopostgrex0.16.0< 0.22.2affected
266b530faf9bde094e31e0e4ab851f933fadc0f5< 7cdedbd4316bb65f82e6a9a4f922c0ac491cb770affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-32687

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
SQL injection via channel name in Postgrex.Notifications.listen/3 and unlisten/3
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in elixir-ecto postgrex ('Elixir.Postgrex.Notifications' module) allows SQL Injection. The channel argument passed to 'Elixir.Postgrex.Notifications':listen/3 and 'Elixir.Postgrex.Notifications':unlisten/3 is interpolated directly into LISTEN "..." / UNLISTEN "..." SQL statements without escaping the " character. An attacker who can influence the channel name can inject a " to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect. This vulnerability is associated with program file lib/postgrex/notifications.ex and program routines 'Elixir.Postgrex.Notifications':listen/3, 'Elixir.Postgrex.Notifications':unlisten/3, 'Elixir.Postgrex.Notifications':handle_connect/1. This issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Postgrex SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Postgrex是elixir-ecto开源的一个Elixir语言的PostgreSQL数据库驱动。 postgrex 0.16.0版本至0.22.2之前版本存在SQL注入漏洞,该漏洞源于Elixir.Postgrex.Notifications模块中未对特殊元素进行中和,可能导致SQL注入攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
elixir-ectopostgrex 0.16.0 ~ 0.22.2 cpe:2.3:a:elixir-ecto:postgrex:*:*:*:*:*:*:*:*
elixir-ectopostgrex 266b530faf9bde094e31e0e4ab851f933fadc0f5 ~ 7cdedbd4316bb65f82e6a9a4f922c0ac491cb770 cpe:2.3:a:elixir-ecto:postgrex:*:*:*:*:*:*:*:*

II. Public POCs for CVE-2026-32687

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-32687

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-32687

No comments yet


Leave a comment