Impact
The vulnerability resides in the ExecuteSQL function within the databaseTool component of ByteDance coze-studio, affecting all releases up to 0.5.1. When an attacker supplies crafted input, the function will concatenate that input directly into a SQL statement, enabling the attacker to execute arbitrary SQL commands on the underlying database. This flaw can lead to reading, modifying, or deleting sensitive data stored in the database, and potentially granting further privileges if the database user has higher-level permissions. The weakness is rooted in the improper handling of untrusted input (CWE‑74 and CWE‑89).
Affected Systems
ByteDance coze‑studio is the affected product, with versions through 0.5.1 vulnerable. No other vendors or products are listed as impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% shows a low but non‑zero probability of exploitation. The vulnerability can be triggered remotely, and an exploit is publicly available, raising the practical risk. The system is not listed in the CISA KEV catalog, so it is not known to be widely exploited yet, but its remote nature and public visibility warrant timely remediation.
OpenCVE Enrichment