CVE-2025-66944
Received Received - Intake
SQL Injection in vran-dev Databaseir Enables Remote Code Execution

Publication date: 2026-03-04

Last updated on: 2026-03-09

Assigner: MITRE

Description
SQL Injection vulnerability in vran-dev databaseir v.1.0.7 and before allows a remote attacker to execute arbitrary code via the query parameter in the search API endpoint
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-04
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-03-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
databasir databasir to 1.0.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2025-66944 is an authenticated SQL Injection vulnerability found in Databasir, a web-based database management and visualization platform (version 1.0.8 and earlier). The flaw exists in the "query" parameter of the search API endpoint, where user input is directly concatenated into a SQL full-text search query without proper sanitization or parameterization.'}, {'type': 'paragraph', 'content': 'This improper handling allows a remote attacker with valid credentials to inject arbitrary SQL commands through the search API, potentially leading to unauthorized data access or remote code execution.'}, {'type': 'paragraph', 'content': 'Proof of concept exploits demonstrate the injection by sending specially crafted requests that cause time delays, confirming the ability to execute arbitrary SQL code.'}] [1, 2]


How can this vulnerability impact me? :

This vulnerability allows a remote authenticated attacker to execute arbitrary SQL commands on the backend database through the search API.

  • Potential data leakage or unauthorized access to sensitive information stored in the database.
  • Remote code execution or full control over the backend database by exploiting the SQL injection.
  • Disruption of service, such as causing delays or errors by injecting time-based SQL commands.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by sending specially crafted requests to the vulnerable search API endpoint and observing the response behavior, particularly time delays caused by SQL injection payloads.'}, {'type': 'paragraph', 'content': 'One example command is a GET request injecting a time-based blind SQL payload into the query parameter to cause a delay, confirming the vulnerability:'}, {'type': 'list_item', 'content': "GET /api/v1.0/search?query=')))+AND+(SELECT+2859+FROM+(SELECT(SLEEP(5)))HraM)%23 HTTP/1.1"}, {'type': 'list_item', 'content': 'Host: 127.0.0.1:9080'}, {'type': 'list_item', 'content': 'Authorization: Bearer <valid_token>'}, {'type': 'paragraph', 'content': 'Additionally, automated tools like sqlmap can be used to detect and exploit the vulnerability by saving the crafted request in a file (e.g., reqsql.txt) and running:'}, {'type': 'list_item', 'content': 'sqlmap -r reqsql.txt --level=5'}] [1, 2]


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart