Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @adonisjs/lucid
  4. ›
  5. CVE-2026-22814

CVE-2026-22814: Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State

January 13, 2026

Description A Mass Assignment (CWE-915) vulnerability in AdonisJS Lucid may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may lead to logic bypasses and unauthorized record modification within a table or model. This affects @adonisjs/lucid through version 21.8.1 and 22.x pre-release versions prior to 22.0.0-next.6. This has been patched in @adonisjs/lucid versions 21.8.2 and 22.0.0-next.6.

References

  • github.com/adonisjs/lucid
  • github.com/adonisjs/lucid/security/advisories/GHSA-g5gc-h5hp-555f
  • github.com/advisories/GHSA-g5gc-h5hp-555f
  • nvd.nist.gov/vuln/detail/CVE-2026-22814

Code Behaviors & Features

Detect and mitigate CVE-2026-22814 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 21.8.2, all versions starting from 22.0.0-next.0 before 22.0.0-next.6

Fixed versions

  • 21.8.2
  • 22.0.0-next.6

Solution

Upgrade to versions 21.8.2, 22.0.0-next.6 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Source file

npm/@adonisjs/lucid/CVE-2026-22814.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:34 +0000.