logo

CVE-2024-10835 dbgpt

Package

Manager: pip
Name: dbgpt
Vulnerable Version: >=0 <0.7.1

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00533 pctl0.66403

Details

DB-GPT is vulnerable to SQL Injection attacks from unauthenticated users In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write using DuckDB SQL, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE).

Metadata

Created: 2025-03-20T12:32:40Z
Modified: 2025-07-17T21:03:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-qccg-9m4q-xfm6/GHSA-qccg-9m4q-xfm6.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-qccg-9m4q-xfm6
Finding: F297
Auto approve: 1