Skip to content

Commit 72bd986

Browse files
1 parent bf0bebf commit 72bd986

3 files changed

Lines changed: 189 additions & 4 deletions

File tree

advisories/unreviewed/2026/03/GHSA-7xf9-4jfc-wgm4/GHSA-7xf9-4jfc-wgm4.json renamed to advisories/github-reviewed/2026/03/GHSA-7xf9-4jfc-wgm4/GHSA-7xf9-4jfc-wgm4.json

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,73 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7xf9-4jfc-wgm4",
4-
"modified": "2026-03-26T21:31:26Z",
4+
"modified": "2026-03-29T15:45:17Z",
55
"published": "2026-03-26T21:31:26Z",
66
"aliases": [
77
"CVE-2026-3121"
88
],
9+
"summary": "Keycloak: manage-clients permission escalates to full realm admin access",
910
"details": "A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over roles, users, or other administrative functions within the realm. This privilege escalation can occur when admin permissions are enabled at the realm level.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.5.6"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3121"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/46719"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/keycloak/keycloak/commit/79ab3110a257fb8d6f1a664c916687128094ed01"
50+
},
2251
{
2352
"type": "WEB",
2453
"url": "https://access.redhat.com/security/cve/CVE-2026-3121"
2554
},
2655
{
2756
"type": "WEB",
2857
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442277"
58+
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/keycloak/keycloak"
2962
}
3063
],
3164
"database_specific": {
3265
"cwe_ids": [
3366
"CWE-266"
3467
],
3568
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
69+
"github_reviewed": true,
70+
"github_reviewed_at": "2026-03-29T15:45:17Z",
3871
"nvd_published_at": "2026-03-26T19:17:06Z"
3972
}
4073
}
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gwhv-j974-6fxm",
4+
"modified": "2026-03-29T15:44:04Z",
5+
"published": "2026-03-29T15:44:04Z",
6+
"aliases": [
7+
"CVE-2026-34220"
8+
],
9+
"summary": "MikroORM is vulnerable to SQL Injection via specially crafted object",
10+
"details": "## Summary\n\nMikroORM versions <= 6.6.9 and <= 7.0.5 are vulnerable to SQL injection when specially crafted objects are interpreted as raw SQL query fragments.\n\n## Impact\n\nIf user-controlled input is passed directly to MikroORM query construction APIs, an attacker may inject raw SQL fragments. This can lead to SQL injection depending on the database and query being executed.\n\n## Affected usage\n\nThe issue occurs when untrusted objects are passed to ORM write APIs such as:\n\n- `wrap(entity).assign(userInput)` followed by `em.flush()`\n- `em.nativeUpdate()`\n- `em.nativeInsert()`\n- `em.create()` followed by `em.flush()`\n\nApplications that validate input types or enforce strict schema validation before passing data to MikroORM are not affected.\n\n## Fix\n\nThe vulnerability was caused by duck-typed detection of internal ORM marker properties.\n\nThe fix replaces these checks with symbol-based markers that cannot be reproduced by user input.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@mikro-orm/core"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "6.6.10"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "npm",
40+
"name": "@mikro-orm/core"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "7.0.0-dev.0"
48+
},
49+
{
50+
"fixed": "7.0.6"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
57+
"references": [
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/mikro-orm/mikro-orm/security/advisories/GHSA-gwhv-j974-6fxm"
61+
},
62+
{
63+
"type": "PACKAGE",
64+
"url": "https://github.com/mikro-orm/mikro-orm"
65+
}
66+
],
67+
"database_specific": {
68+
"cwe_ids": [
69+
"CWE-89"
70+
],
71+
"severity": "CRITICAL",
72+
"github_reviewed": true,
73+
"github_reviewed_at": "2026-03-29T15:44:04Z",
74+
"nvd_published_at": null
75+
}
76+
}
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-qpfv-44f3-qqx6",
4+
"modified": "2026-03-29T15:44:16Z",
5+
"published": "2026-03-29T15:44:16Z",
6+
"aliases": [
7+
"CVE-2026-34221"
8+
],
9+
"summary": "MikroORM has Prototype Pollution in Utils.merge",
10+
"details": "A prototype pollution vulnerability exists in the `Utils.merge` helper used internally by MikroORM when merging object structures.\n\nThe function did not prevent special keys such as `__proto__`, `constructor`, or `prototype`, allowing attacker-controlled input to modify the JavaScript object prototype when merged.\n\nExploitation requires application code to pass untrusted user input into ORM operations that merge object structures, such as entity property assignment or query condition construction.\n\nPrototype pollution may lead to denial of service or unexpected application behavior. In certain scenarios, polluted properties may influence query construction and potentially result in SQL injection depending on application code.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:L/SA:L"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@mikro-orm/core"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "6.6.10"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "npm",
40+
"name": "@mikro-orm/core"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "7.0.0-dev.0"
48+
},
49+
{
50+
"fixed": "7.0.6"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
57+
"references": [
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/mikro-orm/mikro-orm/security/advisories/GHSA-qpfv-44f3-qqx6"
61+
},
62+
{
63+
"type": "PACKAGE",
64+
"url": "https://github.com/mikro-orm/mikro-orm"
65+
}
66+
],
67+
"database_specific": {
68+
"cwe_ids": [
69+
"CWE-1321"
70+
],
71+
"severity": "HIGH",
72+
"github_reviewed": true,
73+
"github_reviewed_at": "2026-03-29T15:44:16Z",
74+
"nvd_published_at": null
75+
}
76+
}

0 commit comments

Comments
 (0)