← Retour aux CVEs
CVE-2025-15598
LOW3.7
Description
A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.
Details CVE
Score CVSS v3.13.7
SeveriteLOW
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisNONE
Interaction utilisateurNONE
Publie3/3/2026
Derniere modification3/5/2026
Sourcenvd
Observations honeypot0
Produits affectes
fit2cloud:sqlbot
Faiblesses (CWE)
CWE-345CWE-347CWE-347
References
https://github.com/yaowenxiao721/Poc/blob/main/SQLBot/SQLBot-JWT-Signature-Verification-Bypass.md(cna@vuldb.com)
https://vuldb.com/?ctiid.348292(cna@vuldb.com)
https://vuldb.com/?id.348292(cna@vuldb.com)
https://vuldb.com/?submit.707291(cna@vuldb.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.