Source: ormar
Version: 0.23.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for ormar.

CVE-2026-27953[0]:
| ormar is a async mini ORM for Python. Versions 0.23.0 and below are
| vulnerable to Pydantic validation bypass through the model
| constructor, allowing any unauthenticated user to skip all field
| validation by injecting "__pk_only__": true into a JSON request
| body. By injecting "__pk_only__": true into a JSON request body, an
| unauthenticated attacker can skip all field validation and persist
| unvalidated data directly to the database. A secondary __excluded__
| parameter injection uses the same pattern to selectively nullify
| arbitrary model fields (e.g., email or role) during construction.
| This affects ormar's canonical FastAPI integration pattern
| recommended in its official documentation, enabling privilege
| escalation, data integrity violations, and business logic bypass in
| any application using ormar.Model directly as a request body
| parameter. This issue has been fixed in version 0.23.1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-27953
    https://www.cve.org/CVERecord?id=CVE-2026-27953
[1] https://github.com/ormar-orm/ormar/security/advisories/GHSA-f964-whrq-44h8
[2] 
https://github.com/ormar-orm/ormar/commit/7f22aa21a7614b993970345b392dabb0ccde0ab3

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to