{"id":71654,"date":"2025-09-05T18:56:12","date_gmt":"2025-09-05T18:56:12","guid":{"rendered":""},"modified":"2025-10-03T23:55:33","modified_gmt":"2025-10-04T05:55:33","slug":"cve-2025-50983-sql-injection-vulnerability-in-readarr-0-4-15-2787","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-50983-sql-injection-vulnerability-in-readarr-0-4-15-2787\/","title":{"rendered":"<strong>CVE-2025-50983: SQL Injection Vulnerability in readarr 0.4.15.2787<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The CVE-2025-50983 is a significant vulnerability that was discovered in the readarr software version 0.4.15.2787. This vulnerability primarily affects those who use readarr for managing their books and could lead to potential system compromise or data leakage. In the ever-growing field of cybersecurity, such <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53520-unchecked-firmware-integrity-and-encryption-vulnerability-in-eg4-systems\/\"  data-wpil-monitor-id=\"82375\">vulnerabilities can pose severe threats to the integrity<\/a>, confidentiality, and availability of data if not resolved promptly. The severity of this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-41525-critical-sql-injection-vulnerability-in-hospital-management-system-v4\/\"  data-wpil-monitor-id=\"79296\">vulnerability highlights the importance of regular system<\/a> updates and thorough security practices.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-50983<br \/>\nSeverity: High (8.3)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-55731-sql-injection-vulnerability-in-frappe-framework-leading-to-potential-data-leakage\/\"  data-wpil-monitor-id=\"79252\">Potential system compromise or data<\/a> leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-2326621085\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>readarr | 0.4.15.2787<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit takes advantage of a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49033-sql-injection-vulnerability-in-profilegrid\/\"  data-wpil-monitor-id=\"79237\">SQL Injection vulnerability<\/a> in the sortKey parameter of the GET \/api\/v1\/wanted\/cutoff API endpoint in readarr 0.4.15.2787. The endpoint fails to sanitize user-supplied input correctly, allowing attackers to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50567-critical-sql-injection-vulnerability-in-saurus-cms-community-edition-4-7-1\/\"  data-wpil-monitor-id=\"79239\">inject and execute arbitrary SQL<\/a> commands against the backend SQLite database. Attackers can use tools such as Sqlmap for exploitation via stacked queries, demonstrating that the parameter can be misused to run arbitrary SQL statements. A heavy query can be executed using SQLite&#8217;s RANDOMBLOB() and HEX() functions to simulate a time-based payload, indicating deep control over database interactions.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-4162891890\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how the vulnerability might be exploited. This is a sample HTTP GET request:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/api\/v1\/wanted\/cutoff?sortKey=1%3BDELETE+FROM+users HTTP\/1.1\nHost: target.example.com<\/code><\/pre>\n<p>This request attempts to exploit the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-41523-sql-injection-vulnerability-in-student-attendance-management-system-v1\/\"  data-wpil-monitor-id=\"79304\">vulnerability by inserting a SQL<\/a> command (`1;DELETE FROM users`) in the sortKey parameter. If successful, this could lead to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-42916-high-impact-database-table-deletion-vulnerability\/\"  data-wpil-monitor-id=\"88667\">deletion of all users from the &#8216;users&#8217; table in the database<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The CVE-2025-50983 is a significant vulnerability that was discovered in the readarr software version 0.4.15.2787. This vulnerability primarily affects those who use readarr for managing their books and could lead to potential system compromise or data leakage. In the ever-growing field of cybersecurity, such vulnerabilities can pose severe threats to the integrity, confidentiality, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[74],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-71654","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-sql-injection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/71654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=71654"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/71654\/revisions"}],"predecessor-version":[{"id":81482,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/71654\/revisions\/81482"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=71654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=71654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=71654"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=71654"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=71654"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=71654"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=71654"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=71654"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=71654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}