Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27953: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in ormar-orm ormar

0
High
VulnerabilityCVE-2026-27953cvecve-2026-27953cwe-915cwe-20
Published: Thu Mar 19 2026 (03/19/2026, 20:23:06 UTC)
Source: CVE Database V5
Vendor/Project: ormar-orm
Product: ormar

Description

CVE-2026-27953 is a high-severity vulnerability in ormar, an async Python ORM, affecting versions prior to 0. 23. 1. It allows unauthenticated attackers to bypass Pydantic field validation by injecting the "__pk_only__": true parameter in JSON request bodies, enabling unvalidated data to be persisted directly to the database. A secondary injection parameter "__excluded__" can nullify arbitrary model fields, such as email or role, facilitating privilege escalation and data integrity violations. This vulnerability impacts applications using ormar. Model directly as a request body parameter, particularly in FastAPI integrations following ormar's official documentation. Exploitation requires no user interaction but does require some level of privilege (PR:L) according to the CVSS vector. The flaw enables attackers to bypass business logic and escalate privileges, potentially compromising application integrity and availability. The issue was fixed in ormar version 0.

AI-Powered Analysis

AILast updated: 03/20/2026, 01:53:39 UTC

Technical Analysis

The vulnerability CVE-2026-27953 resides in ormar, a lightweight asynchronous ORM for Python, specifically in versions 0.23.0 and earlier. Ormar integrates tightly with Pydantic for data validation and is commonly used with FastAPI. The flaw arises from improper control over dynamically determined object attributes during model construction. By injecting a special JSON parameter "__pk_only__": true into a request body, an unauthenticated attacker can bypass all Pydantic field validations. This means that data normally checked for correctness, type, and constraints can be persisted directly to the database without any validation, leading to data integrity issues. Additionally, the injection of a secondary parameter "__excluded__" allows selective nullification of arbitrary model fields, such as sensitive fields like email or user roles, enabling attackers to manipulate critical attributes. Because ormar's official documentation recommends using ormar.Model directly as a request body parameter in FastAPI, this vulnerability affects many applications following this pattern. The vulnerability is classified under CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes) and CWE-20 (Improper Input Validation). The CVSS 3.1 score is 7.1 (high), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and low availability impact (A:L). No known exploits are currently in the wild. The vulnerability was publicly disclosed on March 19, 2026, and fixed in version 0.23.1.

Potential Impact

This vulnerability can have severe consequences for organizations using ormar versions prior to 0.23.1, especially those deploying FastAPI applications with ormar.Model as request body parameters. Attackers can bypass all data validation, allowing injection of malformed or malicious data directly into the database, leading to data integrity violations. The ability to nullify critical fields such as user roles or emails can enable privilege escalation, unauthorized access, and business logic bypass. This compromises the integrity of application data and can disrupt normal operations. Although confidentiality impact is rated none, the integrity and availability impacts are significant. The low availability impact suggests potential minor disruptions or denial of service conditions. Since exploitation requires some privilege level, attackers may need to gain initial access or exploit other vulnerabilities first, but no user interaction is needed. The widespread use of Python, FastAPI, and ormar in modern web applications means many organizations globally could be affected, particularly those in sectors relying on rapid API development and asynchronous frameworks. Failure to patch promptly could lead to unauthorized data manipulation, compliance violations, and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade ormar to version 0.23.1 or later, where the issue is fixed. Review all FastAPI applications using ormar.Model as request body parameters to ensure they do not rely on vulnerable versions. Implement additional input validation layers outside of ormar and Pydantic to detect and block suspicious parameters such as "__pk_only__" and "__excluded__". Employ strict API gateway or WAF rules to filter out unexpected JSON keys that could be used for injection. Conduct thorough code audits to avoid using ormar.Model directly as a request body without validation. Monitor application logs for unusual database writes or unexpected nullification of critical fields. Enforce the principle of least privilege for database access to limit the impact of any successful exploitation. Consider using runtime application self-protection (RASP) tools to detect abnormal behaviors related to model construction and data persistence. Finally, educate developers about secure usage patterns of ormar and Pydantic to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:11:36.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bca5a4e32a4fbe5f143360

Added to database: 3/20/2026, 1:40:52 AM

Last enriched: 3/20/2026, 1:53:39 AM

Last updated: 3/20/2026, 2:44:47 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses