CVE-2025-50983: n/a
SQL Injection vulnerability exists in the sortKey parameter of the GET /api/v1/wanted/cutoff API endpoint in readarr 0.4.15.2787. The endpoint fails to properly sanitize user-supplied input, allowing attackers to inject and execute arbitrary SQL commands against the backend SQLite database. Sqlmap confirmed exploitation via stacked queries, demonstrating that the parameter can be abused to run arbitrary SQL statements. A heavy query was executed using SQLite's RANDOMBLOB() and HEX() functions to simulate a time-based payload, indicating deep control over database interactions.
AI Analysis
Technical Summary
CVE-2025-50983 is a SQL Injection vulnerability identified in the Readarr application, specifically affecting version 0.4.15.2787. The vulnerability resides in the 'sortKey' parameter of the GET /api/v1/wanted/cutoff API endpoint. This parameter does not properly sanitize user input, allowing attackers to inject arbitrary SQL commands directly into the backend SQLite database. Exploitation has been confirmed using sqlmap, a popular automated SQL injection tool, which demonstrated the ability to execute stacked queries. This means an attacker can run multiple SQL statements in a single request, significantly increasing the potential impact. The use of SQLite functions such as RANDOMBLOB() and HEX() in a heavy query simulation indicates that attackers can perform complex database operations, potentially leading to data exfiltration, unauthorized data modification, or denial of service through resource exhaustion. The vulnerability does not currently have a CVSS score assigned, and there is no evidence of known exploits in the wild at this time. However, the technical details confirm deep control over the database through this injection point, highlighting a critical weakness in input validation and query construction within the Readarr API.
Potential Impact
For European organizations using Readarr, particularly those managing large digital media libraries or metadata repositories, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive data stored in the SQLite database, including user information or media metadata. Attackers could also manipulate or delete data, disrupting operations and potentially causing loss of data integrity. Given that Readarr is often deployed in home or small business environments, the impact might be more pronounced in organizations relying on it for cataloging or media management. Additionally, if Readarr instances are exposed to the internet or poorly segmented within internal networks, attackers could leverage this vulnerability as an entry point for lateral movement or further compromise. The absence of authentication requirements for the vulnerable endpoint (not explicitly stated but implied by the nature of the API) would exacerbate the risk, allowing unauthenticated attackers to exploit the flaw remotely. This could lead to reputational damage, compliance issues under GDPR if personal data is compromised, and operational disruptions.
Mitigation Recommendations
Immediate mitigation should focus on input validation and sanitization of the 'sortKey' parameter to prevent injection of malicious SQL code. Developers should implement parameterized queries or prepared statements within the Readarr codebase to eliminate direct concatenation of user input into SQL commands. Until an official patch is released, organizations should restrict access to the vulnerable API endpoint by implementing network-level controls such as IP whitelisting, VPN-only access, or firewall rules to limit exposure. Monitoring and logging API requests for unusual patterns or excessive query complexity can help detect attempted exploitation. Additionally, organizations should conduct an inventory to identify all Readarr instances and ensure they are not publicly accessible. Regular backups of the SQLite database are recommended to enable recovery in case of data corruption or deletion. Finally, organizations should stay alert for official patches or updates from Readarr and apply them promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Norway, Finland, Denmark
CVE-2025-50983: n/a
Description
SQL Injection vulnerability exists in the sortKey parameter of the GET /api/v1/wanted/cutoff API endpoint in readarr 0.4.15.2787. The endpoint fails to properly sanitize user-supplied input, allowing attackers to inject and execute arbitrary SQL commands against the backend SQLite database. Sqlmap confirmed exploitation via stacked queries, demonstrating that the parameter can be abused to run arbitrary SQL statements. A heavy query was executed using SQLite's RANDOMBLOB() and HEX() functions to simulate a time-based payload, indicating deep control over database interactions.
AI-Powered Analysis
Technical Analysis
CVE-2025-50983 is a SQL Injection vulnerability identified in the Readarr application, specifically affecting version 0.4.15.2787. The vulnerability resides in the 'sortKey' parameter of the GET /api/v1/wanted/cutoff API endpoint. This parameter does not properly sanitize user input, allowing attackers to inject arbitrary SQL commands directly into the backend SQLite database. Exploitation has been confirmed using sqlmap, a popular automated SQL injection tool, which demonstrated the ability to execute stacked queries. This means an attacker can run multiple SQL statements in a single request, significantly increasing the potential impact. The use of SQLite functions such as RANDOMBLOB() and HEX() in a heavy query simulation indicates that attackers can perform complex database operations, potentially leading to data exfiltration, unauthorized data modification, or denial of service through resource exhaustion. The vulnerability does not currently have a CVSS score assigned, and there is no evidence of known exploits in the wild at this time. However, the technical details confirm deep control over the database through this injection point, highlighting a critical weakness in input validation and query construction within the Readarr API.
Potential Impact
For European organizations using Readarr, particularly those managing large digital media libraries or metadata repositories, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive data stored in the SQLite database, including user information or media metadata. Attackers could also manipulate or delete data, disrupting operations and potentially causing loss of data integrity. Given that Readarr is often deployed in home or small business environments, the impact might be more pronounced in organizations relying on it for cataloging or media management. Additionally, if Readarr instances are exposed to the internet or poorly segmented within internal networks, attackers could leverage this vulnerability as an entry point for lateral movement or further compromise. The absence of authentication requirements for the vulnerable endpoint (not explicitly stated but implied by the nature of the API) would exacerbate the risk, allowing unauthenticated attackers to exploit the flaw remotely. This could lead to reputational damage, compliance issues under GDPR if personal data is compromised, and operational disruptions.
Mitigation Recommendations
Immediate mitigation should focus on input validation and sanitization of the 'sortKey' parameter to prevent injection of malicious SQL code. Developers should implement parameterized queries or prepared statements within the Readarr codebase to eliminate direct concatenation of user input into SQL commands. Until an official patch is released, organizations should restrict access to the vulnerable API endpoint by implementing network-level controls such as IP whitelisting, VPN-only access, or firewall rules to limit exposure. Monitoring and logging API requests for unusual patterns or excessive query complexity can help detect attempted exploitation. Additionally, organizations should conduct an inventory to identify all Readarr instances and ensure they are not publicly accessible. Regular backups of the SQLite database are recommended to enable recovery in case of data corruption or deletion. Finally, organizations should stay alert for official patches or updates from Readarr and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68af2523ad5a09ad006353c4
Added to database: 8/27/2025, 3:32:51 PM
Last enriched: 8/27/2025, 3:47:45 PM
Last updated: 10/12/2025, 5:28:11 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11638: Denial of Service in Tomofun Furbo 360
MediumCVE-2025-11637: Race Condition in Tomofun Furbo 360
MediumCVE-2025-11636: Server-Side Request Forgery in Tomofun Furbo 360
MediumCVE-2025-11635: Resource Consumption in Tomofun Furbo 360
MediumCVE-2025-33096: CWE-674 Uncontrolled Recursion in IBM Engineering Requirements Management Doors Next
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.