Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j8g6-5gqc-mq36 | Neuron MySQLSelectTool “read-only” bypass via `SELECT ... INTO OUTFILE` (file write → potential RCE) |
Fri, 06 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neuron-ai
Neuron-ai neuron |
|
| CPEs | cpe:2.3:a:neuron-ai:neuron:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Neuron-ai
Neuron-ai neuron |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neuron-core
Neuron-core neuron-ai |
|
| Vendors & Products |
Neuron-core
Neuron-core neuron-ai |
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12. | |
| Title | MySQLSelectTool Read-Only Bypass via SELECT INTO OUTFILE Allows Arbitrary File Write | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-11T15:37:08.650Z
Reserved: 2025-12-08T21:36:28.780Z
Link: CVE-2025-67509
Updated: 2025-12-11T15:36:55.472Z
Status : Analyzed
Published: 2025-12-10T23:15:48.823
Modified: 2026-03-06T19:28:25.407
Link: CVE-2025-67509
No data.
OpenCVE Enrichment
Updated: 2025-12-11T21:38:10Z
Github GHSA