SQL Injection Vulnerability in DataEase Data Visualization Tool
CVE-2026-33082

8.7HIGH

Key Information:

Vendor

Dataease

Status
Vendor
CVE Published:
16 April 2026

What is CVE-2026-33082?

DataEase, an open-source data visualization analysis tool, has a SQL injection vulnerability due to improper handling of user input in its dataset export functionality. The vulnerability exists in versions 2.10.20 and below, where the expressionTree parameter in the POST /de2api/datasetTree/exportDataset endpoint can be manipulated. Specifically, user-controlled values in 'like' filter terms are concatenated directly into SQL statements without adequate sanitization. This flaw allows attackers to execute arbitrary SQL commands, potentially leading to unauthorized access to sensitive database information. The issue has been addressed in version 2.10.21.

Affected Version(s)

dataease < 2.10.21

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.