CVE-2026-32687
Gravedad CVSS v4.0:
ALTA
Tipo:
CWE-89
Neutralización incorrecta de elementos especiales usados en un comando SQL (Inyección SQL)
Fecha de publicación:
12/05/2026
Última modificación:
13/05/2026
Descripción
*** Pendiente de traducción *** Improper Neutralization of Special Elements used in an SQL Command (&#39;SQL Injection&#39;) vulnerability in elixir-ecto postgrex (&#39;Elixir.Postgrex.Notifications&#39; module) allows SQL Injection.<br />
<br />
The channel argument passed to &#39;Elixir.Postgrex.Notifications&#39;:listen/3 and &#39;Elixir.Postgrex.Notifications&#39;:unlisten/3 is interpolated directly into LISTEN "..." / UNLISTEN "..." SQL statements without escaping the " character. An attacker who can influence the channel name can inject a " to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect.<br />
<br />
This vulnerability is associated with program file lib/postgrex/notifications.ex and program routines &#39;Elixir.Postgrex.Notifications&#39;:listen/3, &#39;Elixir.Postgrex.Notifications&#39;:unlisten/3, &#39;Elixir.Postgrex.Notifications&#39;:handle_connect/1.<br />
<br />
This issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.
Impacto
Puntuación base 4.0
7.50
Gravedad 4.0
ALTA



