CVE-2025-61679
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-03

Last updated on: 2025-10-06

Assigner: GitHub, Inc.

Description
Anyquery is an SQL query engine built on top of SQLite. Versions 0.4.3 and below allow attackers who have already gained access to localhost, even with low privileges, to use the http server through the port unauthenticated, and access private integration data like emails, without any warning of a foreign login from the provider. This issue is fixed in version 0.4.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-03
Last Modified
2025-10-06
Generated
2026-05-07
AI Q&A
2025-10-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
julien040 anyquery 0.4.3
julien040 anyquery 0.4.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Anyquery versions 0.4.3 and below, where attackers who have already gained access to localhost, even with low privileges, can use the HTTP server on the port without authentication. This allows them to access private integration data such as emails without any warning of a foreign login from the provider. The issue is fixed in version 0.4.4.


How can this vulnerability impact me? :

The vulnerability can allow an attacker with local access and low privileges to access sensitive private data, such as emails, through the HTTP server without authentication or warning. This can lead to unauthorized data exposure and potential misuse of private integration data.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Anyquery to version 0.4.4 or later, as this version fixes the vulnerability allowing unauthenticated access to private integration data via the HTTP server.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart