#VU126349 Improper access control in DataEase
Published: April 16, 2026
DataEase
DataEase
Description
The vulnerability allows a remote user to disclose sensitive information.
The vulnerability exists due to improper access control in the Mysql datasource configuration and JDBC URL validation logic when processing a crafted datasource configuration request. A remote user can submit a datasource configuration that clears the JDBC parameter blocklist and points the connection to an attacker-controlled MySQL server to disclose sensitive information.
The datasource validation process triggers a JDBC connection immediately, and exploitation relies on the MySQL LOCAL INFILE behavior to read files from the application's filesystem.