Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67510: CWE-250: Execution with Unnecessary Privileges in neuron-core neuron-ai

0
Critical
VulnerabilityCVE-2025-67510cvecve-2025-67510cwe-250cwe-284
Published: Wed Dec 10 2025 (12/10/2025, 22:55:21 UTC)
Source: CVE Database V5
Vendor/Project: neuron-core
Product: neuron-ai

Description

Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.

AI-Powered Analysis

AILast updated: 12/10/2025, 23:16:36 UTC

Technical Analysis

CVE-2025-67510 affects neuron-core's neuron-ai PHP framework, specifically versions prior to 2.8.12. The vulnerability lies in the MySQLWriteTool, which executes arbitrary SQL commands provided by the caller using PDO::prepare() and execute() without semantic restrictions or input validation. While the tool is designed to allow writing to a MySQL database, in the context of AI agents and large language models (LLMs), this capability becomes dangerous because prompt injection or indirect manipulation of prompts can lead to execution of malicious SQL commands. These commands may include destructive operations such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege escalation statements, depending on the database user's permissions. The vulnerability is classified under CWE-250 (Execution with Unnecessary Privileges) and CWE-284 (Improper Access Control). It requires no authentication (PR:N) and no user interaction (UI:N), and can be exploited remotely (AV:N). The CVSS v3.1 base score is 9.4, indicating critical severity with high impact on confidentiality, integrity, and availability. The issue is resolved in neuron-ai version 2.8.12. No known exploits are currently reported in the wild, but the risk is significant given the potential for destructive database operations and the increasing use of AI agents in production environments.

Potential Impact

For European organizations, the impact of CVE-2025-67510 can be severe. Organizations deploying neuron-ai with MySQLWriteTool enabled and exposing AI agents to untrusted inputs risk unauthorized execution of destructive SQL commands. This can lead to data loss, corruption, unauthorized data modification, and potential privilege escalation within the database environment. The availability of critical services relying on the database can be disrupted by commands like DROP TABLE or TRUNCATE. Confidentiality may also be compromised if attackers manipulate privilege-related statements to gain elevated access. Given the growing adoption of AI frameworks in sectors such as finance, healthcare, and government across Europe, exploitation could result in significant operational disruption, regulatory non-compliance, and reputational damage. The lack of authentication and user interaction requirements increases the attack surface, making remote exploitation feasible. Organizations using broad-privilege database users exacerbate the risk, emphasizing the need for strict privilege management and prompt patching.

Mitigation Recommendations

European organizations should immediately upgrade neuron-ai to version 2.8.12 or later to remediate this vulnerability. Until patching is possible, restrict network exposure of AI agents using MySQLWriteTool, especially those accessible to untrusted inputs. Implement strict database user privilege separation by ensuring the database user associated with neuron-ai has only the minimum necessary permissions, avoiding broad privileges that allow destructive commands. Employ input validation and sanitization at the application layer to detect and block malicious prompt injections or SQL commands. Monitor database logs for unusual or unauthorized SQL activity indicative of exploitation attempts. Use web application firewalls (WAFs) with custom rules to detect and block suspicious SQL payloads targeting the AI agent endpoints. Conduct regular security audits and penetration testing focused on AI agent integrations and database interactions. Finally, educate development and security teams about the risks of executing arbitrary SQL in AI contexts and enforce secure coding practices to prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-08T21:46:24.993Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939fbd37cb4621ebe9b284d

Added to database: 12/10/2025, 11:01:39 PM

Last enriched: 12/10/2025, 11:16:36 PM

Last updated: 12/11/2025, 1:06:31 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats