SQL Injection vulnerability exists in the sortKey parameter of the GET /api/v1/wanted/cutoff API endpoint in readarr 0.4.15.2787. The endpoint fails to properly sanitize user-supplied input, allowing attackers to inject and execute arbitrary SQL commands against the backend SQLite database. Sqlmap confirmed exploitation via stacked queries, demonstrating that the parameter can be abused to run arbitrary SQL statements. A heavy query was executed using SQLite's RANDOMBLOB() and HEX() functions to simulate a time-based payload, indicating deep control over database interactions.
Metrics
Affected Vendors & Products
References
History
Wed, 27 Aug 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Readarr
Readarr readarr |
|
Vendors & Products |
Readarr
Readarr readarr |
Wed, 27 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-89 | |
Metrics |
cvssV3_1
|
Wed, 27 Aug 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SQL Injection vulnerability exists in the sortKey parameter of the GET /api/v1/wanted/cutoff API endpoint in readarr 0.4.15.2787. The endpoint fails to properly sanitize user-supplied input, allowing attackers to inject and execute arbitrary SQL commands against the backend SQLite database. Sqlmap confirmed exploitation via stacked queries, demonstrating that the parameter can be abused to run arbitrary SQL statements. A heavy query was executed using SQLite's RANDOMBLOB() and HEX() functions to simulate a time-based payload, indicating deep control over database interactions. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-27T00:00:00.000Z
Updated: 2025-08-27T15:41:01.202Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50983

Updated: 2025-08-27T15:37:08.465Z

Status : Received
Published: 2025-08-27T16:15:35.847
Modified: 2025-08-27T16:15:35.847
Link: CVE-2025-50983

No data.