Skip to main content

CVE-2025-51458: n/a

Unknown
VulnerabilityCVE-2025-51458cvecve-2025-51458
Published: Tue Jul 22 2025 (07/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL Injection in editor_sql_run and query_ex in eosphoros-ai DB-GPT 0.7.0 allows remote attackers to execute arbitrary SQL statements via crafted input passed to the /v1/editor/sql/run or /v1/editor/chart/run endpoints, interacting with api_editor_v1.editor_sql_run, editor_chart_run, and datasource.rdbms.base.query_ex.

AI-Powered Analysis

AILast updated: 07/22/2025, 19:46:21 UTC

Technical Analysis

CVE-2025-51458 is a SQL Injection vulnerability identified in the eosphoros-ai DB-GPT version 0.7.0. The flaw exists in the functionality exposed by the /v1/editor/sql/run and /v1/editor/chart/run API endpoints, which internally invoke the api_editor_v1.editor_sql_run, editor_chart_run, and datasource.rdbms.base.query_ex components. An attacker can exploit this vulnerability by sending crafted input to these endpoints, which is improperly sanitized or validated, allowing arbitrary SQL statements to be executed on the backend database. This type of injection attack can lead to unauthorized data access, data manipulation, or even full compromise of the database server depending on the privileges of the database user context under which the queries are executed. The vulnerability is remote and does not require authentication, increasing the attack surface. Although no known exploits have been reported in the wild yet, the presence of this vulnerability in a database query interface used by DB-GPT—a tool likely designed for AI-driven database querying—makes it a critical concern. The lack of a CVSS score and absence of patch information indicates this is a recently disclosed vulnerability with limited public mitigation guidance at this time.

Potential Impact

For European organizations, the impact of this SQL Injection vulnerability can be severe. Organizations using eosphoros-ai DB-GPT 0.7.0 for database querying or AI-assisted data analysis risk unauthorized exposure or modification of sensitive data, including personal data protected under GDPR. The ability to execute arbitrary SQL commands could lead to data breaches, data integrity loss, or disruption of critical business operations. This could result in regulatory penalties, reputational damage, and financial losses. Furthermore, attackers could leverage this vulnerability as a foothold to pivot into internal networks or escalate privileges, especially if the database server is integrated with other enterprise systems. Given the increasing adoption of AI tools in data processing workflows across European enterprises, this vulnerability poses a tangible risk to sectors such as finance, healthcare, and government agencies that rely heavily on data confidentiality and integrity.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the vulnerable API endpoints (/v1/editor/sql/run and /v1/editor/chart/run) through network-level controls such as firewalls or API gateways to limit exposure to trusted users only. Implementing strict input validation and sanitization on all user-supplied data before it reaches the database query execution layer is critical. Employing parameterized queries or prepared statements in the codebase can prevent SQL Injection by separating code from data. Organizations should monitor logs for suspicious query patterns indicative of injection attempts. Until an official patch is released, consider disabling or isolating the vulnerable DB-GPT components if feasible. Additionally, conducting a thorough security review of all AI-driven database interfaces and applying the principle of least privilege to database accounts used by these services will reduce potential damage. Finally, organizations should stay updated with vendor advisories for patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 687fe6fca83201eaac205b99

Added to database: 7/22/2025, 7:31:08 PM

Last enriched: 7/22/2025, 7:46:21 PM

Last updated: 7/22/2025, 8:04:58 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats