Vulnerability Description
A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fit2Cloud | Sqlbot | <= 1.5.1 |
Related Weaknesses (CWE)
References
- https://github.com/yaowenxiao721/Poc/blob/main/SQLBot/SQLBot-JWT-Signature-VerifExploitThird Party Advisory
- https://vuldb.com/?ctiid.348292Permissions RequiredVDB Entry
- https://vuldb.com/?id.348292Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.707291Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-15598?
CVE-2025-15598 is a vulnerability with a CVSS score of 3.7 (LOW). A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a...
How severe is CVE-2025-15598?
CVE-2025-15598 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-15598?
Check the references section above for vendor advisories and patch information. Affected products include: Fit2Cloud Sqlbot.