GHSA-38CW-85XC-XR9X
6.8
Identity Crisis: Dumping Veramo's Digital Wallets via SQL Injection
Amit Schendel
Senior Security ResearcherJan 17, 2026·5 min read·18 visits
PoC Available
Executive Summary (TL;DR)
The Veramo framework, designed for Self-Sovereign Identity (SSI), contained a massive hole in its data access layer. By manipulating the `order` parameter in API requests, attackers could force the application to execute arbitrary SQL. This bypasses the ORM's protections, allowing full database dumps. If you run Veramo < 6.0.2, your DIDs and private keys are compromised.
A critical SQL injection vulnerability in the Veramo framework's data storage layer allows authenticated attackers to manipulate query ordering parameters, enabling the exfiltration of sensitive data—including private keys and verifiable credentials—from the underlying database.
Official Patches
Fix Analysis (1)
Technical Appendix
CVSS Score
6.8/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:NAffected Systems
Veramo Framework@veramo/data-store@veramo/data-store-json
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
@veramo/data-store Veramo | < 6.0.2 | 6.0.2 |
@veramo/data-store-json Veramo | < 6.0.2 | 6.0.2 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-89 (SQL Injection) |
| CVSS Score | 6.8 (Medium) |
| Attack Vector | Network (Authenticated) |
| Impact | High (Confidentiality & Integrity) |
| Vulnerable Component | decorateQB() |
| Fix Type | Input Validation (Whitelist) |
MITRE ATT&CK Mapping
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerability Timeline
Patch Released in v6.0.2
2026-01-16
Advisory Published
2026-01-16
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.