The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-29087

CVE-2025-29087: SQLite Buffer Overflow Vulnerability

CVE-2025-29087 is a buffer overflow vulnerability in SQLite affecting versions 3.44.0 through 3.49.0. The concat_ws() function causes memory writes beyond allocated buffers. This article covers technical details, impact, and mitigation.

Updated: May 15, 2026

CVE-2025-29087 Overview

CVE-2025-29087 is an integer overflow vulnerability in SQLite affecting versions 3.44.0 through 3.49.0. The flaw resides in the concat_ws() SQL function, which improperly calculates the size of its result buffer when handling large separator arguments. An attacker who can control the separator string (for example, supplying 2MB or more of data) triggers an integer overflow during size calculation. The undersized malloc allocation results in memory being written beyond the end of the heap-allocated buffer. SQLite released version 3.49.1 to address the issue.

Critical Impact

Attacker-controlled input to concat_ws() causes heap memory corruption, leading to denial of service and potential exploitation depending on the SQLite-embedded application.

Affected Products

  • SQLite 3.44.0 through 3.49.0
  • Applications embedding vulnerable SQLite versions
  • SQLite builds prior to 3.49.1

Discovery Timeline

  • 2025-04-07 - CVE-2025-29087 published to NVD
  • 2025-04-30 - Last updated in NVD database

Technical Details for CVE-2025-29087

Vulnerability Analysis

The vulnerability is classified as an integer overflow [CWE-190] in SQLite's concat_ws() SQL function. This function concatenates string arguments with a caller-supplied separator. SQLite calculates the total output buffer size by multiplying the separator length by the number of intervening positions and adding the argument lengths.

When the separator length exceeds approximately 2MB, the size computation overflows a 32-bit integer. The result is a smaller-than-required value passed to malloc(). SQLite then writes the full concatenated output into the undersized buffer, corrupting adjacent heap memory.

The attack vector is network-reachable for any application that exposes SQL execution to remote input. The primary observed impact is availability loss through process crashes, though heap corruption can extend to integrity violations depending on allocator state.

Root Cause

The root cause is an unchecked arithmetic operation in the buffer-size calculation inside the concat_ws() implementation. SQLite does not validate whether the cumulative size of the separator multiplied across all join positions exceeds the integer range used for the allocation request. The truncated value bypasses the allocator's ability to reserve adequate space.

Attack Vector

An attacker submits a SQL query that invokes concat_ws() with a large attacker-controlled separator argument. Any interface that forwards user input into SQL statements — web applications, sync services, or embedded query engines — can act as the delivery channel. The malformed query triggers the overflow during query execution, corrupting the heap and typically crashing the SQLite process.

The vulnerability mechanism is documented in the SQLite Release Log 3.49.1 and the SQLite CVE Documentation. A proof-of-concept demonstrating the overflow trigger is available in the GitHub Gist PoC.

Detection Methods for CVE-2025-29087

Indicators of Compromise

  • Unexpected SQLite process crashes or segmentation faults during query execution
  • SQL queries containing concat_ws() calls with separator arguments exceeding 2MB
  • Application logs reporting malloc failures or heap corruption errors tied to SQLite
  • Abnormally large request bodies submitted to endpoints that interact with SQLite

Detection Strategies

  • Inventory all applications, libraries, and appliances bundling SQLite and identify versions in the 3.44.0 through 3.49.0 range
  • Inspect query logs for invocations of concat_ws() with oversized string parameters
  • Deploy runtime memory-safety instrumentation (AddressSanitizer, Valgrind) in pre-production builds to flag heap overflows
  • Correlate web application firewall logs with downstream SQLite errors to identify probing attempts

Monitoring Recommendations

  • Alert on repeated SQLite crash signals across application fleets
  • Monitor SQL query length and parameter size distributions for outliers
  • Track patch status of embedded SQLite builds in third-party software via SBOM tooling

How to Mitigate CVE-2025-29087

Immediate Actions Required

  • Upgrade SQLite to version 3.49.1 or later across all systems and embedded products
  • Audit application dependencies and container images for vulnerable SQLite versions
  • Restrict untrusted user input from reaching concat_ws() until the patched library is deployed
  • Engage vendors of third-party software bundling SQLite to confirm patched release availability

Patch Information

The SQLite project fixed the integer overflow in version 3.49.1. Details are published in the SQLite Release Log 3.49.1. The fix corrects the buffer-size calculation in concat_ws() to prevent integer truncation when the separator is large. All downstream products embedding SQLite should rebuild and redistribute with the patched library.

Workarounds

  • Filter or reject SQL inputs that pass separator arguments larger than a safe threshold to concat_ws()
  • Disable or restrict access to interfaces that permit arbitrary SQL execution from untrusted users
  • Enforce length limits on input fields that feed concatenation functions in SQL statements
bash
# Verify installed SQLite version
sqlite3 --version

# Example input-size guardrail in application code (pseudocode)
if (length(user_separator) > 1048576) {
    reject_request("separator too large");
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechSqlite

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.22%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-190
  • Technical References
  • GitHub Gist PoC Code

  • SQLite Release Log 3.49.1
  • Vendor Resources
  • SQLite CVE Documentation
  • Related CVEs
  • CVE-2025-6965: SQLite Buffer Overflow Vulnerability

  • CVE-2023-7104: SQLite Heap-Based Buffer Overflow Flaw

  • CVE-2025-3277: SQLite Buffer Overflow Vulnerability

  • CVE-2020-35527: SQLite Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English