Home

Description

Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-10 | Updated 2025-12-11 | Assigner GitHub_M




HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 2.8.12
affected

References

github.com/...ron-ai/security/advisories/GHSA-j8g6-5gqc-mq36

github.com/...ommit/72735d0ea133266cf2f5d5d195d41e9dd865289a

github.com/neuron-core/neuron-ai/releases/tag/2.8.12

cve.org (CVE-2025-67509)

nvd.nist.gov (CVE-2025-67509)

Download JSON