🔐 CVE Alert

CVE-2026-32950

UNKNOWN 0.0

SQLBot: RCE via SQL Injection in Excel Upload Endpoint

CVSS Score
0.0
EPSS Score
0.2%
EPSS Percentile
39th

SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a critical SQL Injection vulnerability in the /api/v1/datasource/uploadExcel endpoint that enables Remote Code Execution (RCE), allowing any authenticated user (even the lowest-privileged) to fully compromise the backend server. The root cause is twofold: Excel Sheet names are concatenated directly into PostgreSQL table names without sanitization (datasource.py#L351), and those table names are embedded into COPY SQL statements via f-strings instead of parameterized queries (datasource.py#L385-L388). An attacker can bypass the 31-character Sheet name limit using a two-stage technique—first uploading a normal file whose data rows contain shell commands, then uploading an XML-tampered file whose Sheet name injects a TO PROGRAM 'sh' clause into the SQL. Confirmed impacts include arbitrary command execution as the postgres user (uid=999), sensitive file exfiltration (e.g., /etc/passwd, /etc/shadow), and complete PostgreSQL database takeover. This issue has been fixed in version 1.7.0.

CWE CWE-89 CWE-78
Vendor dataease
Product sqlbot
Published Mar 20, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for dataease sqlbot

Be the first to know when new unknown vulnerabilities affecting dataease sqlbot are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

dataease / SQLBot
< 1.7.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/dataease/SQLBot/security/advisories/GHSA-7hww-8rj5-7rmm github.com: https://github.com/dataease/SQLBot/commit/39f2203cec4bb4b0aa541710733fe7608e3d3c48 github.com: https://github.com/dataease/SQLBot/releases/tag/v1.7.0