Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57806: CWE-312: Cleartext Storage of Sensitive Information in LearningCircuit local-deep-research

0
Medium
VulnerabilityCVE-2025-57806cvecve-2025-57806cwe-312cwe-522
Published: Wed Sep 03 2025 (09/03/2025, 00:47:24 UTC)
Source: CVE Database V5
Vendor/Project: LearningCircuit
Product: local-deep-research

Description

Local Deep Research is an AI-powered research assistant for deep, iterative research. Versions 0.2.0 through 0.6.7 stored confidential information, including API keys, in a local SQLite database without encryption. This behavior was not clearly documented outside of the database architecture page. Users were not given the ability to configure the database location, allowing anyone with access to the container or host filesystem to retrieve sensitive data in plaintext by accessing the .db file. This is fixed in version 1.0.0.

AI-Powered Analysis

AILast updated: 09/10/2025, 04:50:47 UTC

Technical Analysis

CVE-2025-57806 is a medium-severity vulnerability affecting versions 0.2.0 through 0.6.7 of LearningCircuit's local-deep-research, an AI-powered research assistant designed for deep iterative research tasks. The vulnerability arises from the cleartext storage of sensitive information, including API keys, within a local SQLite database file. This database is stored without encryption and its location is fixed, with no user-configurable option to relocate it. Consequently, any individual with access to the container or host filesystem can directly access the .db file and extract confidential data in plaintext. The issue stems from CWE-312 (Cleartext Storage of Sensitive Information) and CWE-522 (Insufficiently Protected Credentials). The vulnerability was not clearly documented outside of the database architecture page, potentially leading to unawareness among users about the risk. The flaw was addressed and fixed in version 1.0.0 of the software. The CVSS 4.0 base score is 6.9, reflecting a medium severity level, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), no privileges or user interaction required (PR:N, UI:N), and a high impact on confidentiality (VC:H) but no impact on integrity or availability. No known exploits are currently reported in the wild.

Potential Impact

For European organizations using local-deep-research versions prior to 1.0.0, this vulnerability poses a significant risk to the confidentiality of sensitive information, particularly API keys that could grant unauthorized access to external services or internal resources. Since the vulnerability requires local or container-level access, the primary threat vector is insider threats or attackers who have already compromised the host environment. The exposure of API keys can lead to further lateral movement, data exfiltration, or abuse of cloud services, potentially resulting in financial loss, reputational damage, and regulatory non-compliance under GDPR due to inadequate protection of sensitive data. Organizations relying on this tool for research involving confidential or proprietary data may face increased risk of intellectual property theft or leakage. The lack of encryption and fixed database location exacerbates the risk, as attackers do not need to bypass additional security controls to retrieve sensitive data. However, the absence of remote exploitability limits the threat to environments where attackers have already gained some level of access.

Mitigation Recommendations

European organizations should immediately upgrade local-deep-research to version 1.0.0 or later, where the vulnerability has been fixed. Until upgrade is possible, organizations should restrict access to the host filesystem and container environments to trusted personnel only, implementing strict access controls and monitoring for unauthorized access attempts. Encrypting the underlying storage volume or filesystem where the SQLite database resides can provide an additional layer of protection. Organizations should also consider isolating the application within hardened containers with minimal privileges and use host-based intrusion detection systems to alert on suspicious file access. Reviewing and rotating any API keys stored in affected versions is critical to prevent misuse. Additionally, organizations should request or implement configuration options to allow relocation of the database file to more secure locations and advocate for encryption of sensitive data at rest in future software versions. Finally, conducting regular audits of container and host security posture will help detect potential exposures early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-20T14:30:35.009Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b793b8ad5a09ad00ea85dd

Added to database: 9/3/2025, 1:02:48 AM

Last enriched: 9/10/2025, 4:50:47 AM

Last updated: 10/19/2025, 12:40:42 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats