Description
A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.
Problem types
Improper Verification of Cryptographic Signature
Insufficient Verification of Data Authenticity
Product status
1.5.1
Timeline
| 2026-03-01: | Advisory disclosed |
| 2026-03-01: | VulDB entry created |
| 2026-03-01: | VulDB entry last update |
Credits
yaowenxiao (VulDB User)
VulDB
References
vuldb.com/?id.348292 (VDB-348292 | Dataease SQLBot JWT Token auth.py validateEmbedded signature verification)
vuldb.com/?ctiid.348292 (VDB-348292 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.707291 (Submit #707291 | FIT2CLOUD SQLBot 1.3.0 Improper Verification of Cryptographic Signature)
github.com/...ot/SQLBot-JWT-Signature-Verification-Bypass.md