CVE-2026-0603: Hibernate vulnerable to SQL Injection
(updated )
A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application’s database, resulting in an application level denial of service.
References
- access.redhat.com/errata/RHSA-2026:4915
- access.redhat.com/errata/RHSA-2026:4916
- access.redhat.com/errata/RHSA-2026:4917
- access.redhat.com/errata/RHSA-2026:4924
- access.redhat.com/errata/RHSA-2026:6011
- access.redhat.com/errata/RHSA-2026:6012
- access.redhat.com/security/cve/CVE-2026-0603
- bugzilla.redhat.com/show_bug.cgi?id=2427147
- github.com/advisories/GHSA-2p5w-cvg5-gc5c
- github.com/hibernate/hibernate-orm
- nvd.nist.gov/vuln/detail/CVE-2026-0603
Code Behaviors & Features
Detect and mitigate CVE-2026-0603 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →