Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61679: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in julien040 anyquery

0
High
VulnerabilityCVE-2025-61679cvecve-2025-61679cwe-200cwe-287
Published: Fri Oct 03 2025 (10/03/2025, 21:27:35 UTC)
Source: CVE Database V5
Vendor/Project: julien040
Product: anyquery

Description

Anyquery is an SQL query engine built on top of SQLite. Versions 0.4.3 and below allow attackers who have already gained access to localhost, even with low privileges, to use the http server through the port unauthenticated, and access private integration data like emails, without any warning of a foreign login from the provider. This issue is fixed in version 0.4.4.

AI-Powered Analysis

AILast updated: 10/10/2025, 21:49:17 UTC

Technical Analysis

The vulnerability identified as CVE-2025-61679 affects anyquery, an SQL query engine built on SQLite, specifically versions 0.4.3 and earlier. The core issue is an exposure of sensitive information (CWE-200) due to an unauthenticated HTTP server interface that anyquery exposes on localhost. Attackers who have already gained local access to the host, even with minimal privileges, can connect to this HTTP server without authentication and retrieve private integration data such as email addresses. The vulnerability also involves improper authentication controls (CWE-287), as the HTTP server does not require credentials or provide warnings about foreign logins. This flaw allows unauthorized actors to bypass intended access restrictions and extract confidential data, potentially leading to privacy breaches or further attacks. The vulnerability does not require user interaction and does not affect availability but has a high impact on confidentiality and integrity. The CVSS 3.1 base score is 7.7, reflecting a high severity with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high confidentiality and integrity impacts (C:H/I:H/A:N). No known exploits are reported in the wild as of the publication date. The issue is resolved in anyquery version 0.4.4.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality and integrity of sensitive data managed by anyquery, especially integration data like emails that may be critical for business operations or contain personal information protected under GDPR. Unauthorized access to such data could lead to data breaches, regulatory penalties, loss of customer trust, and potential lateral movement within compromised networks. Since exploitation requires local access, the threat is particularly relevant in environments where multiple users share systems, or where attackers can gain footholds via other vulnerabilities or insider threats. Organizations relying on anyquery for data integration or query services may face exposure of sensitive internal data, which could be leveraged for phishing, social engineering, or further compromise. The lack of authentication and alerting increases the stealthiness of the attack, complicating detection and response efforts.

Mitigation Recommendations

European organizations should immediately upgrade anyquery installations to version 0.4.4 or later to remediate this vulnerability. Additionally, restrict local access to systems running anyquery by enforcing strict user permissions and network segmentation to limit who can connect to localhost services. Implement host-based intrusion detection systems (HIDS) to monitor unusual local HTTP connections and access patterns. Regularly audit and harden configurations to ensure no unnecessary services are exposed without authentication. Employ application whitelisting and endpoint protection to prevent unauthorized code execution that could lead to local access. Finally, conduct security awareness training to reduce insider threats and monitor logs for signs of suspicious activity related to anyquery or its HTTP interface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-29T20:25:16.181Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0416dfe629daf7734019d

Added to database: 10/3/2025, 9:34:37 PM

Last enriched: 10/10/2025, 9:49:17 PM

Last updated: 11/16/2025, 7:46:45 AM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats