DEBIAN-CVE-2026-26198

Source
https://security-tracker.debian.org/tracker/CVE-2026-26198
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26198.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-26198
Upstream
  • CVE-2026-26198
Published
2026-02-24T03:16:01.100Z
Modified
2026-02-25T00:34:13.611153Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into sqlalchemy.text() without any validation or sanitization. The min() and max() methods in the QuerySet class accept arbitrary string input as the column parameter. While sum() and avg() are partially protected by an is_numeric type check that rejects non-existent fields, min() and max() skip this validation entirely. As a result, an attacker-controlled string is embedded as raw SQL inside the aggregate function call. Any unauthorized user can exploit this vulnerability to read the entire database contents, including tables unrelated to the queried model, by injecting a subquery as the column parameter. Version 0.23.0 contains a patch.

References

Affected packages

Debian:12 / ormar

Package

Name
ormar
Purl
pkg:deb/debian/ormar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.12.0-3
0.12.2-1
0.20.2-1
0.21.0-1
0.22.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26198.json"

Debian:14 / ormar

Package

Name
ormar
Purl
pkg:deb/debian/ormar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.11.2-1
0.11.2-2
0.11.2-3
0.11.3-1
0.12.0-1
0.12.0-2
0.12.0-3
0.12.2-1
0.20.2-1
0.21.0-1
0.22.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26198.json"