Vulnerability Description
A vulnerability was determined in Dataease SQLbot up to 1.6.0. This issue affects the function get_es_data_by_http of the file backend/apps/db/es_engine.py of the component Elasticsearch Handler. This manipulation of the argument address causes server-side request forgery. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.7.0 is capable of addressing this issue. You should upgrade the affected component. The vendor was contacted early about this disclosure.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/dataease/SQLBot/releases/tag/v1.7.0
- https://vuldb.com/submit/756043
- https://vuldb.com/vuln/354854
- https://vuldb.com/vuln/354854/cti
- https://www.notion.so/SQLbot-SSRF-in-Elasticsearch-Unvalidated-Requests-2afea92a
FAQ
What is CVE-2026-5417?
CVE-2026-5417 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A vulnerability was determined in Dataease SQLbot up to 1.6.0. This issue affects the function get_es_data_by_http of the file backend/apps/db/es_engine.py of the component Elasticsearch Handler. This...
How severe is CVE-2026-5417?
CVE-2026-5417 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5417?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.