CVE-2025-15598

A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.
References
Link Resource
https://github.com/yaowenxiao721/Poc/blob/main/SQLBot/SQLBot-JWT-Signature-Verification-Bypass.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.348292 Permissions Required VDB Entry
https://vuldb.com/?id.348292 Third Party Advisory VDB Entry
https://vuldb.com/?submit.707291 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:fit2cloud:sqlbot:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-03 10:16

Updated : 2026-03-05 21:52


NVD link : CVE-2025-15598

Mitre link : CVE-2025-15598

CVE.ORG link : CVE-2025-15598


JSON object : View

Products Affected

fit2cloud

  • sqlbot
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-347

Improper Verification of Cryptographic Signature