Stored Prompt Injection Flaw in SQLBot by DataEase
CVE-2026-32622

8.6HIGH

Key Information:

Vendor

Dataease

Status
Vendor
CVE Published:
19 March 2026

What is CVE-2026-32622?

SQLBot, an intelligent data query system developed by DataEase, has a critical security flaw known as Stored Prompt Injection present in versions 1.5.0 and earlier. This vulnerability emerges from three interlinked issues: inadequate permission checks on the Excel upload API that allow authenticated users to upload harmful terminology, unsanitized retention of terminology descriptions housing unsafe payloads, and insufficient semantic barriers when incorporating terminology into the LLM’s system prompt. Consequently, this enables potential attackers to manipulate the system's reasoning capabilities to craft malicious PostgreSQL commands, resulting in unauthorized remote code execution with elevated privileges on the database or application server. This security risk is addressed in version 1.6.0.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

SQLBot < 1.6.0

References

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.