Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fit2cloud
Fit2cloud sqlbot |
|
| CPEs | cpe:2.3:a:fit2cloud:sqlbot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fit2cloud
Fit2cloud sqlbot |
|
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dataease
Dataease sqlbot |
|
| Vendors & Products |
Dataease
Dataease sqlbot |
Fri, 20 Mar 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a Server-Side Request Forgery (SSRF) vulnerability that allows an attacker to retrieve arbitrary system and application files from the server. An attacker can exploit the /api/v1/datasource/check endpoint by configuring a forged MySQL data source with a malicious parameter extraJdbc="local_infile=1". When the SQLBot backend attempts to verify the connectivity of this data source, an attacker-controlled Rogue MySQL server issues a malicious LOAD DATA LOCAL INFILE command during the MySQL handshake. This forces the target server to read arbitrary files from its local filesystem (such as /etc/passwd or configuration files) and transmit the contents back to the attacker. This issue was fixed in version 1.7.0. | |
| Title | SQLBot: SSRF to Arbitrary File Read (AFR) via Rogue MySQL | |
| Weaknesses | CWE-73 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T19:50:35.555Z
Reserved: 2026-03-17T00:05:53.284Z
Link: CVE-2026-32949
Updated: 2026-03-20T19:50:19.414Z
Status : Analyzed
Published: 2026-03-20T05:16:14.387
Modified: 2026-03-23T17:35:16.990
Link: CVE-2026-32949
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:09:21Z