← Back to CVEs
CVE-2025-50983
HIGH8.3
Description
SQL Injection vulnerability exists in the sortKey parameter of the GET /api/v1/wanted/cutoff API endpoint in readarr 0.4.15.2787. The endpoint fails to properly sanitize user-supplied input, allowing attackers to inject and execute arbitrary SQL commands against the backend SQLite database. Sqlmap confirmed exploitation via stacked queries, demonstrating that the parameter can be abused to run arbitrary SQL statements. A heavy query was executed using SQLite's RANDOMBLOB() and HEX() functions to simulate a time-based payload, indicating deep control over database interactions.
CVE Details
CVSS v3.1 Score8.3
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published8/27/2025
Last Modified9/9/2025
Sourcenvd
Honeypot Sightings0
Affected Products
readarr:readarr
Weaknesses (CWE)
CWE-89
References
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.