{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T10:34:36.536","vulnerabilities":[{"cve":{"id":"CVE-2025-67509","sourceIdentifier":"security-advisories@github.com","published":"2025-12-10T23:15:48.823","lastModified":"2026-03-06T19:28:25.407","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass.  MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:neuron-ai:neuron:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.12","matchCriteriaId":"D96BDF42-DA23-4C58-B81A-0BC477136145"}]}]}],"references":[{"url":"https://github.com/neuron-core/neuron-ai/commit/72735d0ea133266cf2f5d5d195d41e9dd865289a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/neuron-core/neuron-ai/releases/tag/2.8.12","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/neuron-core/neuron-ai/security/advisories/GHSA-j8g6-5gqc-mq36","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}