Fix sqlx — CVE-2024-28114 HIGH

Fix CVE-2024-28114 (HIGH) in sqlx for Rust. Paste your Cargo.toml into PackageFix and get a patched version — no CLI, no signup. Sql injection via improper escaping in query macros.

⚠ Vulnerability

CVE-2024-28114 (HIGH) — SQL injection via improper escaping in query macros in sqlx below 0.7.4.

Vulnerable — Cargo.toml

sqlx = "0.6.3"

Fixed — Cargo.toml

sqlx = "0.7.4"
✓ Fix

Update sqlx to 0.7.4 and run cargo update.

Paste your manifest — get back a fixed version with all CVEs patched in seconds.

Open PackageFix →

No signup · No CLI · No GitHub connection · Runs 100% in your browser

CVE Details

FieldValue
CVE IDCVE-2024-28114
SeverityHIGH
Packagesqlx (Rust)
Safe version0.7.4
CISA KEV
DescriptionSql injection via improper escaping in query macros

Frequently Asked Questions

What is CVE-2024-28114?
CVE-2024-28114 is a HIGH severity vulnerability in sqlx (Rust) that allows SQL injection via improper escaping in query macros. Update to 0.7.4 or later.
How do I fix CVE-2024-28114 in sqlx?
Update sqlx to version 0.7.4 in your Cargo.toml and run cargo update.
Is CVE-2024-28114 being actively exploited?
Check packagefix.dev — the CISA KEV catalog updates daily.
How do I verify the fix for CVE-2024-28114?
After updating, paste your Cargo.toml into PackageFix again. If CVE-2024-28114 no longer appears in the CVE table, the fix is applied.

Related Guides