CVE-2025-15597
Improper Access Control in Dataease SQLBot API Enables Remote Exploit
Publication date: 2026-03-02
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fit2cloud | sqlbot | to 1.5.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-15597 is a broken function level authorization vulnerability in Dataease SQLBot versions up to 1.4.0. It affects multiple API endpoints, particularly the assistant.py file in the backend. The vulnerability arises from missing or improper access control checks, allowing any authenticated user to bypass authorization and perform unauthorized actions.
This flaw enables privilege escalation within the application by allowing users with low privileges to access, modify, or delete resources they should not have permission to. The issue impacts various management APIs including workspace, datasource, dashboard, terminology, chat record, user, table relation, and AI model management.
The vulnerability can be exploited remotely without local access or user interaction, and a public proof-of-concept exploit is available. The root cause is a core design flaw involving lack of input validation and insufficient session token verification.
Upgrading to SQLBot version 1.5.0, which includes a comprehensive patch enforcing strict permission validation and access control, mitigates this issue.
How can this vulnerability impact me? :
This vulnerability can have significant impacts including unauthorized access to sensitive data, unauthorized modification or deletion of critical resources, and privilege escalation within the SQLBot application.
- Any authenticated user can bypass authorization checks to view, create, modify, or delete workspaces, datasources, dashboards, terminology entries, chat records, user accounts, table relations, and AI models.
- Attackers can remotely exploit the vulnerability without needing local access or user interaction.
- Confidentiality, integrity, and availability of the system are at risk due to unauthorized data exposure and manipulation.
- The vulnerability enables privilege escalation, allowing low-privileged users to perform administrative actions.
Overall, exploitation could lead to data breaches, loss of data integrity, disruption of services, and unauthorized control over the application environment.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability involves broken function level authorization in multiple API endpoints of Dataease SQLBot up to version 1.4.0, allowing unauthorized access and privilege escalation. Detection can focus on monitoring API calls that bypass proper authorization checks, especially those involving workspace management, datasource management, user management, and other critical API endpoints.'}, {'type': 'paragraph', 'content': 'Since the vulnerability allows any authenticated user to perform unauthorized CRUD operations on various resources, detection commands should include attempts to access or manipulate these API endpoints without proper permissions.'}, {'type': 'paragraph', 'content': 'Suggested detection methods include:'}, {'type': 'list_item', 'content': 'Monitor HTTP API requests to endpoints such as POST /api/v1/datasource/check and other API endpoints related to workspace, datasource, user, and AI model management for unauthorized access attempts.'}, {'type': 'list_item', 'content': 'Check logs for API calls made with valid authentication tokens (e.g., x-sqlbot-token) from low-privileged users performing actions normally restricted to admins.'}, {'type': 'list_item', 'content': 'Use network monitoring tools (e.g., tcpdump, Wireshark) to capture and analyze traffic to the SQLBot API endpoints for suspicious or unauthorized API calls.'}, {'type': 'list_item', 'content': 'If you have access to the system, use curl or similar HTTP clients to test authorization enforcement, for example:'}, {'type': 'list_item', 'content': 'curl -X POST https://your-sqlbot-instance/api/v1/datasource/check -H "x-sqlbot-token: <low-privilege-token>" -d \'{"datasource": "test"}\''}, {'type': 'list_item', 'content': 'Attempt to perform unauthorized CRUD operations on workspace, datasource, user, or AI model APIs using authenticated tokens with limited privileges to verify if access controls are enforced.'}] [2, 3, 4]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'The primary and recommended mitigation for this vulnerability is to upgrade Dataease SQLBot to version 1.5.0 or later, where the issue has been fixed by enforcing strict permission validation and access control on all affected API endpoints.'}, {'type': 'paragraph', 'content': "The patch identified by commit d640ac31d1ce64ce90e06cf7081163915c9fc28c implements comprehensive permission checks requiring the 'ws_admin' role for sensitive API operations, preventing unauthorized access and privilege escalation."}, {'type': 'paragraph', 'content': 'Additional immediate steps include:'}, {'type': 'list_item', 'content': 'Restrict network access to the SQLBot API endpoints to trusted users and systems only.'}, {'type': 'list_item', 'content': 'Review and rotate authentication tokens or credentials that might have been exposed or misused.'}, {'type': 'list_item', 'content': 'Monitor logs for suspicious activity and unauthorized API calls.'}, {'type': 'list_item', 'content': 'If upgrading immediately is not possible, consider implementing temporary access controls such as firewall rules or API gateway policies to limit access to critical API endpoints.'}] [3, 4, 15]