Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g5gc-h5hp-555f | Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State |
Wed, 14 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adonisjs
Adonisjs lucid |
|
| Vendors & Products |
Adonisjs
Adonisjs lucid |
Tue, 13 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | @adonisjs/lucid is an SQL ORM for AdonisJS built on top of Knex. Prior to 21.8.2 and 22.0.0-next.6, there is a Mass Assignment vulnerability in AdonisJS Lucid which may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may lead to logic bypasses and unauthorized record modification within a table or model. This affects @adonisjs/lucid through version 21.8.1 and 22.x pre-release versions prior to 22.0.0-next.6. This has been patched in @adonisjs/lucid versions 21.8.2 and 22.0.0-next.6. | |
| Title | Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State | |
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-14T17:26:12.012Z
Reserved: 2026-01-09T22:50:10.288Z
Link: CVE-2026-22814
Updated: 2026-01-14T17:26:09.379Z
Status : Deferred
Published: 2026-01-13T20:16:11.427
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-22814
No data.
OpenCVE Enrichment
Updated: 2026-04-18T06:45:23Z
Github GHSA