Description
DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the API datasource update process. When a new table definition is added during a datasource update via /de2api/datasource/update, the deTableName field from the user-submitted configuration is passed to DatasourceSyncManage.createEngineTable, where it is substituted into a CREATE TABLE statement template without any sanitization or identifier escaping. An authenticated attacker can inject arbitrary SQL commands by crafting a deTableName that breaks out of identifier quoting, enabling error-based SQL injection that can extract database information. This issue has been fixed in version 2.10.21.
Published: 2026-04-16
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: SQL Injection with potential to exfiltrate confidential data
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the datasource update API of DataEase, where a user-supplied table name is interpolated directly into a CREATE TABLE statement without sanitization or proper quoting. An attacker who can authenticate to the platform can craft a malicious deTableName value that escapes the intended identifier context, enabling execution of arbitrary SQL commands. This flaw can lead to extraction of database metadata or other sensitive information, directly compromising data confidentiality.

Affected Systems

DataEase, version 2.10.20 and all releases preceding that, which lack the proper sanitization in the datasource update flow. The issue was addressed in version 2.10.21 and later releases.

Risk and Exploitability

The flaw carries a high CVSS score of 8.6, indicating a high risk to affected installations. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation at present. Nonetheless, the requirement for an authenticated session means the attacker must possess valid user credentials and have permissions to update datasources; once those conditions are met, exploitation can occur via the injected SQL during a datasource update. The potential impact includes unauthorized data disclosure and possibly database compromise if the injected SQL commands extend beyond benign queries.

Generated by OpenCVE AI on April 16, 2026 at 21:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade DataEase to version 2.10.21 or later, which implements proper sanitization for datasource updates.
  • Restrict datasource update permissions so that only trusted administrators can modify datasource configurations, minimizing the number of accounts that can trigger the vulnerable endpoint.
  • Audit existing datasource configurations to ensure that deTableName values are valid identifiers and do not contain characters that could break out of the intended SQL context.

Generated by OpenCVE AI on April 16, 2026 at 21:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Dataease
Dataease dataease
Vendors & Products Dataease
Dataease dataease

Thu, 16 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the API datasource update process. When a new table definition is added during a datasource update via /de2api/datasource/update, the deTableName field from the user-submitted configuration is passed to DatasourceSyncManage.createEngineTable, where it is substituted into a CREATE TABLE statement template without any sanitization or identifier escaping. An authenticated attacker can inject arbitrary SQL commands by crafting a deTableName that breaks out of identifier quoting, enabling error-based SQL injection that can extract database information. This issue has been fixed in version 2.10.21.
Title DataEase has SQL Injection via Datasource Management
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Dataease Dataease
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-16T19:24:03.195Z

Reserved: 2026-03-17T20:35:49.926Z

Link: CVE-2026-33122

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-16T20:16:38.640

Modified: 2026-04-16T20:16:38.640

Link: CVE-2026-33122

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T22:00:02Z

Weaknesses