A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.
References
| Link | Resource |
|---|---|
| https://github.com/yaowenxiao721/Poc/blob/main/SQLBot/SQLBot-JWT-Signature-Verification-Bypass.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.348292 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348292 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.707291 | Third Party Advisory VDB Entry |
Configurations
History
05 Mar 2026, 21:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/yaowenxiao721/Poc/blob/main/SQLBot/SQLBot-JWT-Signature-Verification-Bypass.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.348292 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.348292 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.707291 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:fit2cloud:sqlbot:*:*:*:*:*:*:*:* | |
| First Time |
Fit2cloud sqlbot
Fit2cloud |
|
| Summary |
|
03 Mar 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-03 10:16
Updated : 2026-03-05 21:52
NVD link : CVE-2025-15598
Mitre link : CVE-2025-15598
CVE.ORG link : CVE-2025-15598
JSON object : View
Products Affected
fit2cloud
- sqlbot
