{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-8724","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-05-16T09:35:03.939Z","datePublished":"2026-05-17T00:30:10.259Z","dateUpdated":"2026-05-17T00:30:10.259Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-05-17T00:30:10.259Z"},"title":"Dataease Data Dashboard SqlparserUtils.java SqlparserUtils.transFilter sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"Dataease","versions":[{"version":"2.10.20","status":"affected"}],"cpes":["cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*"],"modules":["Data Dashboard"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Dataease 2.10.20. Impacted is the function SqlparserUtils.transFilter of the file SqlparserUtils.java of the component Data Dashboard. The manipulation results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-05-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-05-16T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-05-16T11:40:29.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xpp39 (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/364315","name":"VDB-364315 | Dataease Data Dashboard SqlparserUtils.java SqlparserUtils.transFilter sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/364315/cti","name":"VDB-364315 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/804256","name":"Submit #804256 | Dataease dataease v2.10.20 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/xpp3901/CVE_APPLY/tree/main/V-D001_DataEase_SqlVariable_Injection","tags":["exploit"]}]}}}