SQL Injection Vulnerability in DataEase Open-Source Analytics Platform
CVE-2026-33121

8.7HIGH

Key Information:

Vendor

Dataease

Status
Vendor
CVE Published:
16 April 2026

What is CVE-2026-33121?

DataEase, an open-source data visualization and analytics platform, is exposed to a SQL injection vulnerability affecting versions 2.10.20 and below. This vulnerability arises during the API datasource saving process, where the deTableName field in the Base64-encoded datasource configuration is utilized to construct a Data Definition Language (DDL) statement without proper sanitization or escaping. As a result, an authenticated attacker can manipulate the deTableName to inject arbitrary SQL commands, potentially extracting sensitive database information such as MySQL version details. To mitigate this risk, users are advised to upgrade to version 2.10.21 or later, where the vulnerability has been addressed.

Affected Version(s)

dataease < 2.10.21

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.