← Back to CVEs
CVE-2025-15598
LOW3.7
Description
A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.
CVE Details
CVSS v3.1 Score3.7
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published3/3/2026
Last Modified3/5/2026
Sourcenvd
Honeypot Sightings0
Affected Products
fit2cloud:sqlbot
Weaknesses (CWE)
CWE-345CWE-347CWE-347
References
https://github.com/yaowenxiao721/Poc/blob/main/SQLBot/SQLBot-JWT-Signature-Verification-Bypass.md(cna@vuldb.com)
https://vuldb.com/?ctiid.348292(cna@vuldb.com)
https://vuldb.com/?id.348292(cna@vuldb.com)
https://vuldb.com/?submit.707291(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.