Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7076 | In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write using DuckDB SQL, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE). |
Github GHSA |
GHSA-qccg-9m4q-xfm6 | DB-GPT is vulnerable to SQL Injection attacks from unauthenticated users |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 17 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dbgpt
Dbgpt db-gpt |
|
| CPEs | cpe:2.3:a:dbgpt:db-gpt:0.6.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Dbgpt
Dbgpt db-gpt |
|
| Metrics |
cvssV3_1
|
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write using DuckDB SQL, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE). | |
| Title | Arbitrary File Write via SQL Injection in eosphoros-ai/db-gpt | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T18:37:53.483Z
Reserved: 2024-11-04T23:45:34.336Z
Link: CVE-2024-10835
Updated: 2025-03-20T17:53:42.888Z
Status : Analyzed
Published: 2025-03-20T10:15:20.870
Modified: 2025-07-17T13:39:16.200
Link: CVE-2024-10835
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA