Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.7
DataEase versions 2.10.20 and below: SQL injection risk in data sorting
CVE-2026-33084
Summary
DataEase users may be at risk of unauthorized data access due to a flaw in the data sorting feature. An attacker with an account on the platform can potentially inject malicious code to access sensitive data. Update to version 2.10.21 or later to fix the issue.
Original title
DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the sort parameter of the /de2api/datasetData/enumValueObj ...
Original description
DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the sort parameter of the /de2api/datasetData/enumValueObj endpoint. The DatasetDataManage service layer directly transfers the user-supplied sort value to the sorting metadata DTO, which is passed to Order2SQLObj where it is incorporated into the SQL ORDER BY clause without any whitelist validation, and then executed via CalciteProvider. An authenticated attacker can inject arbitrary SQL commands through the sort parameter, enabling time-based blind SQL injection. This issue has been fixed in version 2.10.21.
nvd CVSS4.0
8.7
Vulnerability type
CWE-89
SQL Injection
Published: 16 Apr 2026 · Updated: 16 Apr 2026 · First seen: 16 Apr 2026