Total CVEs

126,116

Critical Severity

2,290

High Severity

7,924

Last 7 Days

1,177
Quick preset (or use dates below)
Clear Filters
πŸ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years β†’
Showing 1 - 20 of 21 CVEs
CVE-2026-40901 HIGH - 8.8

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below ship the legacy velocity-1.7.jar, which pulls in commons-collections-3.2.1.jar containing the InvokerTransformer deserialization gadget chain. Quartz 2.3.2, also bundled in the application, deserializes ...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-40900 HIGH - 8.8

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the /de2api/datasetData/previewSql endpoint. The user-supplied SQL is wrapped in a subquery without validation that the input is a single SELECT statement. Combin...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-40899 MEDIUM - 6.5

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a JDBC parameter blocklist bypass vulnerability in the MySQL datasource configuration. The Mysql class uses Lombok's @Data annotation, which auto-generates a public setter for the illegalPar...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-33207 HIGH - 8.8

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the /datasource/getTableField endpoint. The getTableFiledSql method in CalciteProvider.java incorporates the tableName parameter directly into SQL query strings u...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-33122 CRITICAL - 9.8

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the API datasource update process. When a new table definition is added during a datasource update via /de2api/datasource/update, the deTableName field from the u...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-33121 HIGH - 8.8

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the API datasource saving process. The deTableName field from the Base64-encoded datasource configuration is used to construct a DDL statement via simple string r...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-33084 HIGH - 8.8

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the sort parameter of the /de2api/datasetData/enumValueObj endpoint. The DatasetDataManage service layer directly transfers the user-supplied sort value to the so...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-33083 HIGH - 8.8

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the orderDirection parameter used in dataset-related endpoints including /de2api/datasetData/enumValueDs and /de2api/datasetTree/exportDataset. The Order2SQLObj c...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-33082 CRITICAL - 9.8

DataEase is an open source data visualization analysis tool. Versions 2.10.20 and below contain a SQL injection vulnerability in the dataset export functionality. The expressionTree parameter in POST /de2api/datasetTree/exportDataset is deserialized into a filtering object and passed to WhereTree2St...

Vendor: dataease
Product: dataease
Published: Apr 16, 2026
Source: NVD
CVE-2026-5417 MEDIUM - 4.7

A vulnerability was determined in Dataease SQLbot up to 1.6.0. This issue affects the function get_es_data_by_http of the file backend/apps/db/es_engine.py of the component Elasticsearch Handler. This manipulation of the argument address causes server-side request forgery. The attack may be initiate...

Published: Apr 02, 2026
Source: NVD
CVE-2026-32950 HIGH - 8.8

SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a critical SQL Injection vulnerability in the /api/v1/datasource/uploadExcel endpoint that enables Remote Code Execution (RCE), allowing any authenticated user (even the lowest-privile...

Vendor: dataease
Product: SQLBot
Published: Mar 20, 2026
Source: NVD
CVE-2026-32949 HIGH - 7.5

SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a Server-Side Request Forgery (SSRF) vulnerability that allows an attacker to retrieve arbitrary system and application files from the server. An attacker can exploit the /api/v1/datas...

Vendor: dataease
Product: SQLBot
Published: Mar 20, 2026
Source: NVD
CVE-2026-32939 HIGH - 8.1

DataEase is an open source data visualization analysis tool. Versions 2.10.19 and below have inconsistent Locale handling between the JDBC URL validation logic and the H2 JDBC engine's internal parsing. DataEase uses String.toUpperCase() without specifying an explicit Locale, causing its securi...

Vendor: dataease
Product: dataease
Published: Mar 20, 2026
Source: NVD
CVE-2026-32622 HIGH - 8.8

SQLBot is an intelligent data query system based on a large language model and RAG. Versions 1.5.0 and below contain a Stored Prompt Injection vulnerability that chains three flaws: a missing permission check on the Excel upload API allowing any authenticated user to upload malicious terminology, un...

Vendor: dataease
Product: SQLBot
Published: Mar 19, 2026
Source: NVD
CVE-2026-32140 HIGH - 8.8

Dataease is an open source data visualization analysis tool. Prior to 2.10.20, By controlling the IniFile parameter, an attacker can force the JDBC driver to load an attacker-controlled configuration file. This configuration file can inject dangerous JDBC properties, leading to remote code execution...

Vendor: dataease
Product: dataease
Published: Mar 12, 2026
Source: NVD
CVE-2026-32139 MEDIUM - 5.4

Dataease is an open source data visualization analysis tool. In DataEase 2.10.19 and earlier, the static resource upload interface allows SVG uploads. However, backend validation only checks whether the XML is parseable and whether the root node is svg. It does not sanitize active content such as on...

Vendor: dataease
Product: dataease
Published: Mar 12, 2026
Source: NVD
CVE-2026-32137 HIGH - 8.8

Dataease is an open source data visualization analysis tool. Prior to 2.10.20, The table parameter for /de2api/datasource/previewData is directly concatenated into the SQL statement without any filtering or parameterization. Since tableName is a user-controllable string, attackers can inject malicio...

Vendor: dataease
Product: dataease
Published: Mar 12, 2026
Source: NVD

A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiat...

Vendor: Dataease
Product: SQLBot
Published: Mar 03, 2026
Source: NVD
CVE-2025-15597 MEDIUM - 6.3

A vulnerability has been found in Dataease SQLBot up to 1.4.0. This affects an unknown function of the file backend/apps/system/api/assistant.py of the component API Endpoint. Such manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disc...

Vendor: Dataease
Product: SQLBot
Published: Mar 02, 2026
Source: NVD

Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that...

Vendor: dataease
Product: dataease
Published: Jan 22, 2026
Source: NVD