Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 03 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure. | |
| Title | Dataease SQLBot JWT Token auth.py validateEmbedded signature verification | |
| Weaknesses | CWE-345 CWE-347 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-03T09:32:06.880Z
Reserved: 2026-03-01T06:30:48.792Z
Link: CVE-2025-15598
No data.
Status : Received
Published: 2026-03-03T10:16:05.973
Modified: 2026-03-03T10:16:05.973
Link: CVE-2025-15598
No data.
OpenCVE Enrichment
No data.