PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-8724 Dataease CVE debrief

CVE-2026-8724 describes a SQL injection flaw affecting Dataease 2.10.20 in the Data Dashboard component, specifically the SqlparserUtils.transFilter function in SqlparserUtils.java. The issue is described as remotely reachable and the supplied record says public exploit material has been released. The published CVSS information is low overall, but the combination of SQL injection, remote reachability, and exploit availability makes this worth reviewing quickly if the product is in use.

Vendor
Dataease
Product
Unknown
CVSS
LOW 2
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-17
Original CVE updated
2026-05-19
Advisory published
2026-05-17
Advisory updated
2026-05-19

Who should care

Organizations running Dataease 2.10.20, especially teams exposing Data Dashboard functionality to untrusted or semi-trusted users. Security, platform, and application owners should care most if the application is internet-facing or if users can influence filter or query parameters.

Technical summary

The supplied description says manipulation of SqlparserUtils.transFilter in the Data Dashboard component leads to SQL injection. NVD-linked weakness classifications include CWE-74 and CWE-89. The CVSS vector provided by the source indicates network attack feasibility, no user interaction, and high privileges required (PR:H), with low impacts across confidentiality, integrity, and availability. The description also notes that exploit material was publicly released.

Defensive priority

Moderate for exposed or actively used deployments; lower urgency for isolated systems, but still important because the issue is remotely reachable and publicly described as exploitable. Treat as higher priority if Dataease is internet-facing or if privileged users can trigger the affected code path.

Recommended defensive actions

  • Confirm whether Dataease 2.10.20 is deployed anywhere in your environment, including non-production instances.
  • Review the vendor or project advisories referenced by the official NVD record for any fixed version or mitigation guidance.
  • Restrict access to Data Dashboard and any filter/query functionality until patched or otherwise mitigated.
  • Audit logs and database access for unexpected query patterns or signs of injection attempts.
  • Apply least-privilege database credentials to reduce impact if SQL injection is triggered.
  • Monitor for follow-on updates to the official CVE and NVD entries, since the supplied record does not include a fix version.

Evidence notes

This debrief is based only on the supplied CVE/NVD corpus and the listed references. The CVE description explicitly names Dataease 2.10.20, the Data Dashboard component, and SqlparserUtils.transFilter in SqlparserUtils.java. The official NVD record marks the entry as received and lists CWE-74 and CWE-89. The source metadata also includes a GitHub reference and VulDB references, but no fix version or patch advisory is present in the supplied corpus. The vendor field in the source item is unresolved/needs review, so product attribution should be treated as coming from the CVE description rather than from vendor metadata.

Official resources

The CVE was published on 2026-05-17. The supplied description says the vendor was contacted early, and it also states that public exploit material had been released by the time of disclosure.