PT-2026-26367 · Sqlbot · Sqlbot

Jackieya

·

Published

2026-03-19

·

Updated

2026-03-23

·

CVE-2026-32622

CVSS v3.1

8.8

High

AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions SQLBot versions 1.5.0 and below
Description SQLBot is an intelligent data query system based on a large language model and RAG. Versions 1.5.0 and below contain a Stored Prompt Injection issue that combines three flaws: a missing permission check on the Excel upload API allowing any authenticated user to upload malicious terminology, unsanitized storage of terminology descriptions containing dangerous payloads, and a lack of semantic fencing when injecting terminology into the LLM's system prompt. These flaws allow an attacker to hijack the LLM's reasoning to generate malicious PostgreSQL commands (e.g., COPY ... TO PROGRAM), ultimately achieving Remote Code Execution on the database or application server with postgres user privileges. The API endpoint used for malicious uploads is the Excel upload API. The vulnerable parameter is the uploaded Excel file containing malicious terminology.
Recommendations Versions prior to 1.6.0 should be updated to version 1.6.0 or later.

Fix

RCE

Missing Authorization

Command Injection

Special Elements Injection

Weakness Enumeration

Related Identifiers

CVE-2026-32622

Affected Products

Sqlbot