CVE-2025-65104: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in FirebirdSQL firebird
CVE-2025-65104 is a high-severity vulnerability in FirebirdSQL affecting client library versions prior to 4. 0. 0. The issue arises because the FB3 client library incorrectly places data length values into XSQLDA fields when communicating with FB4 or higher servers, leading to exposure of sensitive information to unauthorized actors. This vulnerability is classified under CWE-200, indicating an information disclosure flaw. There is no explicit vendor advisory or patch link provided, but upgrading to the FB4 client or higher is stated as the fix. The vulnerability has a CVSS 3. 1 score of 7. 9, reflecting a significant impact on confidentiality, integrity, and availability with low attack complexity and requiring low privileges. No known exploits in the wild have been reported.
AI Analysis
Technical Summary
FirebirdSQL versions prior to 4.0.0 contain a vulnerability (CVE-2025-65104) where the FB3 client library incorrectly sets data length values in XSQLDA fields during communication with FB4 or newer servers. This flaw causes an information leak, exposing sensitive data to unauthorized actors. The vulnerability is categorized as CWE-200 (Exposure of Sensitive Information). The issue is resolved by upgrading the client library to version 4.0.0 or later. The CVSS 3.1 base score is 7.9, indicating high severity with local attack vector, low complexity, and partial privileges required. No official patch or vendor advisory is provided in the data, so patch status is not confirmed beyond the upgrade recommendation.
Potential Impact
The vulnerability allows unauthorized actors to gain access to sensitive information due to incorrect data length values in client-server communication. This can lead to partial compromise of confidentiality, with some impact on integrity and availability as indicated by the CVSS vector. The attack requires local access with low privileges and no user interaction, but can cause significant data exposure in affected environments.
Mitigation Recommendations
Upgrade the Firebird client library to version 4.0.0 or higher, as this resolves the incorrect data length handling and prevents the information leak. Since no official vendor advisory or patch link is provided, confirm the upgrade path with FirebirdSQL official resources. Patch status is not explicitly confirmed beyond the upgrade recommendation, so verify current remediation guidance from the vendor before deployment.
CVE-2025-65104: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in FirebirdSQL firebird
Description
CVE-2025-65104 is a high-severity vulnerability in FirebirdSQL affecting client library versions prior to 4. 0. 0. The issue arises because the FB3 client library incorrectly places data length values into XSQLDA fields when communicating with FB4 or higher servers, leading to exposure of sensitive information to unauthorized actors. This vulnerability is classified under CWE-200, indicating an information disclosure flaw. There is no explicit vendor advisory or patch link provided, but upgrading to the FB4 client or higher is stated as the fix. The vulnerability has a CVSS 3. 1 score of 7. 9, reflecting a significant impact on confidentiality, integrity, and availability with low attack complexity and requiring low privileges. No known exploits in the wild have been reported.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
FirebirdSQL versions prior to 4.0.0 contain a vulnerability (CVE-2025-65104) where the FB3 client library incorrectly sets data length values in XSQLDA fields during communication with FB4 or newer servers. This flaw causes an information leak, exposing sensitive data to unauthorized actors. The vulnerability is categorized as CWE-200 (Exposure of Sensitive Information). The issue is resolved by upgrading the client library to version 4.0.0 or later. The CVSS 3.1 base score is 7.9, indicating high severity with local attack vector, low complexity, and partial privileges required. No official patch or vendor advisory is provided in the data, so patch status is not confirmed beyond the upgrade recommendation.
Potential Impact
The vulnerability allows unauthorized actors to gain access to sensitive information due to incorrect data length values in client-server communication. This can lead to partial compromise of confidentiality, with some impact on integrity and availability as indicated by the CVSS vector. The attack requires local access with low privileges and no user interaction, but can cause significant data exposure in affected environments.
Mitigation Recommendations
Upgrade the Firebird client library to version 4.0.0 or higher, as this resolves the incorrect data length handling and prevents the information leak. Since no official vendor advisory or patch link is provided, confirm the upgrade path with FirebirdSQL official resources. Patch status is not explicitly confirmed beyond the upgrade recommendation, so verify current remediation guidance from the vendor before deployment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-17T20:55:34.693Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e27e0fbdfbbecc5978c95e
Added to database: 4/17/2026, 6:38:07 PM
Last enriched: 4/17/2026, 6:53:06 PM
Last updated: 4/17/2026, 9:31:08 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.