CVE-2025-15598
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to bypass the security checks on cryptographic signatures in the SQLBot application, potentially allowing unauthorized access to sensitive data. However, exploiting this flaw requires a high level of skill and is considered complex, making it difficult for most attackers to take advantage of it.
Technical Description
A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 3, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
fit2cloud
Product
sqlbot
Related Vulnerabilities
This vulnerability allows an attacker to bypass access controls on the SQLBot API, potentially giving them unauthorized access to sensitive data or functions. The attack can be carried out remotely, so it's important to upgrade to version 1.5.0 to protect against this issue.
This vulnerability allows an attacker to manipulate the employee list query in CordysCRM, potentially gaining unauthorized access to sensitive data stored in the database. It requires the attacker to send specially crafted input through the departmentIds parameter in the user list interface.