CVE-2025-15598 PUBLISHED

Dataease SQLBot JWT Token auth.py validateEmbedded signature verification

Assigner: VulDB
Reserved: 01.03.2026 Published: 03.03.2026 Updated: 03.03.2026

A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.3

Product Status

Vendor Dataease
Product SQLBot
Versions
  • Version 1.5.0 is affected
  • Version 1.5.1 is affected

Credits

  • yaowenxiao (VulDB User) reporter
  • VulDB coordinator

References

Problem Types

  • Improper Verification of Cryptographic Signature CWE
  • Insufficient Verification of Data Authenticity CWE