CVE-2025-15597
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to bypass access controls on the SQLBot API, potentially giving them unauthorized access to sensitive data or functions. The attack can be carried out remotely, so it's important to upgrade to version 1.5.0 to protect against this issue.
Technical Description
A vulnerability has been found in Dataease SQLBot up to 1.4.0. This affects an unknown function of the file backend/apps/system/api/assistant.py of the component API Endpoint. Such manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.0 mitigates this issue. The name of the patch is d640ac31d1ce64ce90e06cf7081163915c9fc28c. Upgrading the affected component is recommended. Multiple endpoints are affected. The vendor was contacted early about this disclosure.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 2, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
fit2cloud
Product
sqlbot
Related Vulnerabilities
This vulnerability allows an attacker to bypass the security checks on cryptographic signatures in the SQLBot application, potentially allowing unauthorized access to sensitive data. However, exploiting this flaw requires a high level of skill and is considered complex, making it difficult for most attackers to take advantage of it.
This vulnerability allows an attacker to manipulate the employee list query in CordysCRM, potentially gaining unauthorized access to sensitive data stored in the database. It requires the attacker to send specially crafted input through the departmentIds parameter in the user list interface.