SQL injection in strapi - CVE-2026-22599

 

SQL injection in strapi - CVE-2026-22599

Published: May 13, 2026


Vulnerability identifier: #VU131368
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-22599
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: strapi.io
Affected software:
strapi

Detailed vulnerability description

The vulnerability allows a remote user to execute arbitrary database statements.

The vulnerability exists due to SQL injection in the Content-Type Builder write API when processing the column.defaultTo attribute during content-type creation or modification. A remote privileged user can send crafted API input using a tuple with isRaw: true to execute arbitrary database statements.

This occurs during schema migration when the supplied value is passed directly into Knex's db.connection.raw() without sanitization.


How to mitigate CVE-2026-22599

Install security update from vendor's website.

Sources