CVE-2025-62422

8.8 HIGH

📋 TL;DR

CVE-2025-62422 is a SQL injection vulnerability in DataEase's /de2api/datasetData/tableField interface that allows attackers to execute arbitrary SQL commands by manipulating the tableName parameter. This affects all DataEase installations running version 2.10.13 or earlier. Successful exploitation could lead to data theft, data manipulation, or complete system compromise.

💻 Affected Systems

Products:
  • DataEase
Versions: 2.10.13 and earlier
Operating Systems: All platforms running DataEase
Default Config Vulnerable: ⚠️ Yes
Notes: All DataEase deployments with the vulnerable endpoint exposed are affected. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, data destruction, privilege escalation to database administrator, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized data access and extraction from the DataEase database, potentially exposing sensitive business intelligence, user data, or credentials.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, though the vulnerability would still exist in the codebase.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via API and SQL injection attacks can be automated and executed remotely without authentication.
🏢 Internal Only: HIGH - Even internal attackers or compromised internal systems could exploit this to gain unauthorized database access and potentially move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are well-understood and easily weaponized. The advisory confirms the vulnerability exists but no public exploit code has been identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.14

Vendor Advisory: https://github.com/dataease/dataease/security/advisories/GHSA-54m5-xrw4-mv36

Restart Required: Yes

Instructions:

1. Backup your DataEase instance and database. 2. Download version 2.10.14 from the official repository. 3. Stop the DataEase service. 4. Replace the installation with the patched version. 5. Restart the DataEase service. 6. Verify the fix by checking the version.

🔧 Temporary Workarounds

No official workarounds

all

The vendor advisory states no known workarounds exist for this vulnerability.

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with SQL injection detection rules to block malicious requests to the /de2api/datasetData/tableField endpoint.
  • Restrict network access to the DataEase instance using firewall rules to only allow trusted IP addresses or networks.

🔍 How to Verify

Check if Vulnerable:

Check the DataEase version via the web interface admin panel or by examining the application files. If version is 2.10.13 or earlier, the system is vulnerable.

Check Version:

Check the DataEase web interface admin panel or examine the application's version file if accessible via command line.

Verify Fix Applied:

After patching, verify the version shows 2.10.14 or later in the admin panel. Test the /de2api/datasetData/tableField endpoint with safe input to ensure it functions normally without errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed or unusual requests to /de2api/datasetData/tableField
  • Requests with suspicious tableName parameters containing SQL keywords

Network Indicators:

  • Unusual traffic patterns to the DataEase API endpoint
  • Requests containing SQL injection payloads in the tableName parameter

SIEM Query:

source="dataease.logs" AND (url_path="/de2api/datasetData/tableField" AND (param_tableName CONTAINS "UNION" OR param_tableName CONTAINS "SELECT" OR param_tableName CONTAINS "INSERT" OR param_tableName CONTAINS "DELETE" OR param_tableName CONTAINS "DROP"))

🔗 References

📤 Share & Export