CVE-2025-66944
SQL Injection in vran-dev Databaseir Enables Remote Code Execution
Publication date: 2026-03-04
Last updated on: 2026-03-09
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| databasir | databasir | to 1.0.7 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2025-66944 is an authenticated SQL Injection vulnerability found in Databasir, a web-based database management and visualization platform (version 1.0.8 and earlier). The flaw exists in the "query" parameter of the search API endpoint, where user input is directly concatenated into a SQL full-text search query without proper sanitization or parameterization.'}, {'type': 'paragraph', 'content': 'This improper handling allows a remote attacker with valid credentials to inject arbitrary SQL commands through the search API, potentially leading to unauthorized data access or remote code execution.'}, {'type': 'paragraph', 'content': 'Proof of concept exploits demonstrate the injection by sending specially crafted requests that cause time delays, confirming the ability to execute arbitrary SQL code.'}] [1, 2]
How can this vulnerability impact me? :
This vulnerability allows a remote authenticated attacker to execute arbitrary SQL commands on the backend database through the search API.
- Potential data leakage or unauthorized access to sensitive information stored in the database.
- Remote code execution or full control over the backend database by exploiting the SQL injection.
- Disruption of service, such as causing delays or errors by injecting time-based SQL commands.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by sending specially crafted requests to the vulnerable search API endpoint and observing the response behavior, particularly time delays caused by SQL injection payloads.'}, {'type': 'paragraph', 'content': 'One example command is a GET request injecting a time-based blind SQL payload into the query parameter to cause a delay, confirming the vulnerability:'}, {'type': 'list_item', 'content': "GET /api/v1.0/search?query=')))+AND+(SELECT+2859+FROM+(SELECT(SLEEP(5)))HraM)%23 HTTP/1.1"}, {'type': 'list_item', 'content': 'Host: 127.0.0.1:9080'}, {'type': 'list_item', 'content': 'Authorization: Bearer <valid_token>'}, {'type': 'paragraph', 'content': 'Additionally, automated tools like sqlmap can be used to detect and exploit the vulnerability by saving the crafted request in a file (e.g., reqsql.txt) and running:'}, {'type': 'list_item', 'content': 'sqlmap -r reqsql.txt --level=5'}] [1, 2]
What immediate steps should I take to mitigate this vulnerability?
I don't know