#VU126355 SQL injection in DataEase - CVE-2026-33082
Published: April 16, 2026
DataEase
DataEase
Description
The vulnerability allows a remote user to execute arbitrary SQL commands.
The vulnerability exists due to insufficient sanitization of user-provided input in the dataset export filter processing in WhereTree2Str when handling POST requests to /de2api/datasetTree/exportDataset with a crafted expressionTree parameter. A remote user can send a specially crafted request to execute arbitrary SQL commands.
The issue occurs when the filtering term uses like conditions during transformation from JSON input into a raw SQL query.