Description
A flaw has been found in CodePhiliaX Chat2DB up to 0.3.7. This vulnerability affects the function exportTable/exportTableColumnComment/exportView/exportProcedure/exportTriggers/exportTrigger/updateProcedure of the file DMDBManage.java of the component Database Export Handler. This manipulation causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-15
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection (Database Compromise)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in CodePhiliaX Chat2DB, located in DMDBManage.java, allows an attacker to perform SQL injection through several export functions. The flaw permits remote manipulation of the SQL statements that the application constructs, potentially enabling the attacker to read, modify, or delete data stored in the database. This leads to a compromise of the confidentiality and integrity of database contents, and if exploited with higher privileges, could facilitate further escalation or denial‑of‑service conditions.

Affected Systems

CodePhiliaX:Chat2DB versions up to 0.3.7 are affected. The vulnerability resides in the Database Export Handler component, specifically the files DMDBManage.java and functions exportTable, exportTableColumnComment, exportView, exportProcedure, exportTriggers, exportTrigger, and updateProcedure.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, but the EPSS score of less than 1% shows that exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. The attack vector is remote; attackers can trigger the injection by accessing the exported actions via HTTP requests to the application. Although an exploit has been published, no official fix or patch is currently available, underscoring the need to mitigate the risk through available controls.

Generated by OpenCVE AI on March 17, 2026 at 16:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest available patch for CodePhiliaX Chat2DB that removes the SQL injection flaw (>=0.3.8 if released).
  • If an official patch is not yet available, restrict network access to the Database Export Handler endpoints to authenticated and authorized users only.
  • Disable or temporarily remove the export and updateProcedure features until a patch is applied.
  • Monitor application logs for suspicious activity that may indicate exploitation attempts.
  • Consult the vendor for an official update or advisory and apply it as soon as it is released.

Generated by OpenCVE AI on March 17, 2026 at 16:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Codephiliax
Codephiliax chat2db
Vendors & Products Codephiliax
Codephiliax chat2db

Sun, 15 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in CodePhiliaX Chat2DB up to 0.3.7. This vulnerability affects the function exportTable/exportTableColumnComment/exportView/exportProcedure/exportTriggers/exportTrigger/updateProcedure of the file DMDBManage.java of the component Database Export Handler. This manipulation causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title CodePhiliaX Chat2DB Database Export DMDBManage.java updateProcedure sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Codephiliax Chat2db
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T13:20:49.751Z

Reserved: 2026-03-14T15:03:38.828Z

Link: CVE-2026-4173

cve-icon Vulnrichment

Updated: 2026-03-17T13:20:46.265Z

cve-icon NVD

Status : Deferred

Published: 2026-03-16T14:19:57.663

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-4173

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:55Z

Weaknesses