Description
A flaw has been found in eosphoros-ai db-gpt up to 0.7.5. This vulnerability affects unknown code of the file /api/v1/editor/ of the component Incomplete Fix. This manipulation causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-20
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection Allowing Remote Database Access and Potential Code Execution (Medium‑High Severity)
Action: Patch If Possible
AI Analysis

Impact

A flaw in the eosphoros‑ai db‑gpt component exposes the /api/v1/editor/ endpoint to SQL injection attacks. The vulnerability is exploitable from a remote attacker who can send crafted input that is interpreted directly by the database. Successful exploitation could allow the attacker to read, modify, or delete data in the database, and under certain conditions, may provide a foothold for further compromise or remote code execution. The CVSS score of 6.9 indicates that the impact is significant but does not guarantee full system takeover. The publicly available exploit demonstrates that the flaw is already in the wild and can be used without additional privileges.

Affected Systems

The vulnerability affects eosphoros‑ai db‑gpt versions up to 0.7.5. No single revision beyond 0.7.5 is known to be impacted, and there is no information indicating that any earlier or later branches are remedied. The attack is confined to the exposed web API, so any deployment of the affected version that allows remote access to /api/v1/editor/ is susceptible.

Risk and Exploitability

The reported CVSS score of 6.9 reflects a medium‑high risk, and the EPSS score is not available. The vulnerability is not listed in CISA’s KEV catalog, but an exploitation tool has already been published, suggesting that attackers may target vulnerable installations. The attack vector is remote, via HTTP requests to the editor API, and no privileged local execution is required. Given the absence of a vendor response and the lack of an available patch, the risk remains high until the affected component is removed or secured.

Generated by OpenCVE AI on March 20, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify if a newer version of eosphoros‑ai db‑gpt has been released that addresses the SQL injection; if available, upgrade immediately.
  • If no patch exists, restrict traffic to the /api/v1/editor/ endpoint by firewall rules or IP whitelisting to limit exposure to trusted hosts.
  • Implement request sanitization or parameterized queries within the application to neutralize SQL injection attempts against the editor API.
  • Monitor web server and database logs for anomalous query patterns or repeated injection attempts and investigate any suspicious activity.

Generated by OpenCVE AI on March 20, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Eosphoros-ai
Eosphoros-ai db-gpt
Vendors & Products Eosphoros-ai
Eosphoros-ai db-gpt

Fri, 20 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in eosphoros-ai db-gpt up to 0.7.5. This vulnerability affects unknown code of the file /api/v1/editor/ of the component Incomplete Fix. This manipulation causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title eosphoros-ai db-gpt Incomplete Fix editor sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Eosphoros-ai Db-gpt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T21:24:28.741Z

Reserved: 2026-03-20T14:03:12.975Z

Link: CVE-2026-4504

cve-icon Vulnrichment

Updated: 2026-03-20T21:24:24.412Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T20:16:50.680

Modified: 2026-03-23T14:32:02.800

Link: CVE-2026-4504

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:46Z

Weaknesses