๐Ÿ” CVE Alert

CVE-2026-32949

UNKNOWN 0.0

SQLBot: SSRF to Arbitrary File Read (AFR) via Rogue MySQL

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
11th

SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a Server-Side Request Forgery (SSRF) vulnerability that allows an attacker to retrieve arbitrary system and application files from the server. An attacker can exploit the /api/v1/datasource/check endpoint by configuring a forged MySQL data source with a malicious parameter extraJdbc="local_infile=1". When the SQLBot backend attempts to verify the connectivity of this data source, an attacker-controlled Rogue MySQL server issues a malicious LOAD DATA LOCAL INFILE command during the MySQL handshake. This forces the target server to read arbitrary files from its local filesystem (such as /etc/passwd or configuration files) and transmit the contents back to the attacker. This issue was fixed in version 1.7.0.

CWE CWE-918 CWE-73
Vendor dataease
Product sqlbot
Published Mar 20, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for dataease sqlbot

Be the first to know when new unknown vulnerabilities affecting dataease sqlbot are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

dataease / SQLBot
< 1.7.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/dataease/SQLBot/security/advisories/GHSA-wqj3-xcxf-j9m9 github.com: https://github.com/dataease/SQLBot/commit/ff98514827bad99b8fa4b39385adecc6e3d44355 github.com: https://github.com/dataease/SQLBot/releases/tag/v1.7.0