CVE-2026-32687
Severity CVSS v4.0:
HIGH
Type:
CWE-89
SQL Injection
Publication date:
12/05/2026
Last modified:
13/05/2026
Description
Improper Neutralization of Special Elements used in an SQL Command (&#39;SQL Injection&#39;) vulnerability in elixir-ecto postgrex (&#39;Elixir.Postgrex.Notifications&#39; module) allows SQL Injection.<br />
<br />
The channel argument passed to &#39;Elixir.Postgrex.Notifications&#39;:listen/3 and &#39;Elixir.Postgrex.Notifications&#39;:unlisten/3 is interpolated directly into LISTEN "..." / UNLISTEN "..." SQL statements without escaping the " character. An attacker who can influence the channel name can inject a " to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect.<br />
<br />
This vulnerability is associated with program file lib/postgrex/notifications.ex and program routines &#39;Elixir.Postgrex.Notifications&#39;:listen/3, &#39;Elixir.Postgrex.Notifications&#39;:unlisten/3, &#39;Elixir.Postgrex.Notifications&#39;:handle_connect/1.<br />
<br />
This issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.
Impact
Base Score 4.0
7.50
Severity 4.0
HIGH



