sqls-server/sqls 0.2.28 is vulnerable to command injection in the config command because the openEditor function passes the EDITOR environment variable and config file path to sh -c without sanitization, allowing attackers to execute arbitrary commands.
History

Fri, 31 Oct 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sqls-server
Sqls-server sqls
Vendors & Products Sqls-server
Sqls-server sqls

Thu, 30 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Description sqls-server/sqls 0.2.28 is vulnerable to command injection in the config command because the openEditor function passes the EDITOR environment variable and config file path to sh -c without sanitization, allowing attackers to execute arbitrary commands.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-10-30T00:00:00.000Z

Updated: 2025-10-30T21:02:01.794Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61141

cve-icon Vulnrichment

Updated: 2025-10-30T21:01:56.932Z

cve-icon NVD

Status : Received

Published: 2025-10-30T20:15:39.263

Modified: 2025-10-30T21:15:36.500

Link: CVE-2025-61141

cve-icon Redhat

No data.