CVE-2025-70829
Medium
|5.7Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows authenticated attackers to access sensitive data by exploiting a custom connection string in Datart. It requires the attacker to already have access to the system, meaning they need to be logged in to take advantage of this flaw.
Technical Description
An information exposure vulnerability in Datart v1.0.0-rc.3 allows authenticated attackers to access sensitive data via a custom H2 JDBC connection string.
CVSS Vector Analysis
Attack VectorAdjacent Network
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged
Vector String
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$793($500-$1K)
Vendor Response
Grade APatched in 5 days
Quick Information
Published
Feb 17, 2026
about 2 months ago
Last Modified
Feb 23, 2026
about 1 month ago
Vendor
running-elephant
Product
datart