No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dataease
Dataease sqlbot |
|
| Vendors & Products |
Dataease
Dataease sqlbot |
Tue, 03 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure. | |
| Title | Dataease SQLBot JWT Token auth.py validateEmbedded signature verification | |
| Weaknesses | CWE-345 CWE-347 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-03T14:33:05.697Z
Reserved: 2026-03-01T06:30:48.792Z
Link: CVE-2025-15598
Updated: 2026-03-03T14:33:00.546Z
Status : Awaiting Analysis
Published: 2026-03-03T10:16:05.973
Modified: 2026-03-03T21:52:29.877
Link: CVE-2025-15598
No data.
OpenCVE Enrichment
Updated: 2026-03-04T14:54:26Z