{"api_version":"1","generated_at":"2026-04-23T07:01:45+00:00","cve":"CVE-2022-21227","urls":{"html":"https://cve.report/CVE-2022-21227","api":"https://cve.report/api/cve/CVE-2022-21227.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-21227","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-21227"},"summary":{"title":"CVE-2022-21227","description":"The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.","state":"PUBLIC","assigner":"report@snyk.io","published_at":"2022-05-01 16:15:00","updated_at":"2022-05-11 14:10:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a","name":"https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a","refsource":"MISC","tags":[],"title":"bug: fix segfault of invalid toString() object (#1450) · TryGhost/node-sqlite3@593c9d4 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645","name":"https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645","refsource":"MISC","tags":[],"title":"Denial of Service (DoS) in sqlite3 | CVE-2022-21227 | Snyk","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470","name":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470","refsource":"MISC","tags":[],"title":"Denial of Service (DoS) in org.webjars.npm:sqlite3 | CVE-2022-21227 | Snyk","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-21227","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21227","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Cristian-Alexandru Staicu","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"21227","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ghost","cpe5":"sqlite3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-21227","qid":"180867","title":"Debian Security Update for node-sqlite3 (CVE-2022-21227)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"report@snyk.io","DATE_PUBLIC":"2022-05-01T15:20:21.681780Z","ID":"CVE-2022-21227","STATE":"PUBLIC","TITLE":"Denial of Service (DoS)"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"sqlite3","version":{"version_data":[{"version_affected":"<","version_value":"5.0.3"}]}}]},"vendor_name":"n/a"}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Denial of Service (DoS)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645","name":"https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645"},{"refsource":"MISC","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470","name":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470"},{"refsource":"MISC","url":"https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a","name":"https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a"}]},"description":{"description_data":[{"lang":"eng","value":"The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine."}]},"impact":{"cvss":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},"credit":[{"lang":"eng","value":"Cristian-Alexandru Staicu"}]},"nvd":{"publishedDate":"2022-05-01 16:15:00","lastModifiedDate":"2022-05-11 14:10:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ghost:sqlite3:*:*:*:*:*:node.js:*:*","versionEndExcluding":"5.0.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}