Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32950

CVE-2026-32950: Fit2cloud Sqlbot SQLi Vulnerability

CVE-2026-32950 is a critical SQL injection flaw in Fit2cloud Sqlbot that enables remote code execution through the uploadExcel endpoint. This post covers the technical details, affected versions, impact, and mitigation.

Published: March 27, 2026

CVE-2026-32950 Overview

CVE-2026-32950 is a critical SQL Injection vulnerability in SQLBot, an intelligent data query system built on large language models and RAG (Retrieval-Augmented Generation) technology. The vulnerability exists in the /api/v1/datasource/uploadExcel endpoint and enables Remote Code Execution (RCE), allowing any authenticated user—even those with the lowest privileges—to fully compromise the backend server.

Critical Impact

This vulnerability allows authenticated attackers to execute arbitrary commands as the postgres user (uid=999), exfiltrate sensitive files including /etc/passwd and /etc/shadow, and achieve complete PostgreSQL database takeover.

Affected Products

  • Fit2cloud SQLBot versions prior to 1.7.0
  • SQLBot deployments using PostgreSQL backend database
  • Any system running vulnerable /api/v1/datasource/uploadExcel endpoint

Discovery Timeline

  • 2026-03-20 - CVE-2026-32950 published to NVD
  • 2026-03-23 - Last updated in NVD database

Technical Details for CVE-2026-32950

Vulnerability Analysis

The vulnerability stems from a fundamental failure to properly sanitize user-controlled input before incorporating it into SQL statements. The affected endpoint processes Excel file uploads where sheet names are directly concatenated into PostgreSQL table names without any sanitization in datasource.py at line 351. These unsanitized table names are then embedded into COPY SQL statements using Python f-strings rather than parameterized queries at lines 385-388.

This architectural flaw creates a direct path from user-controlled Excel file content to SQL execution context. The impact is particularly severe because PostgreSQL's COPY command supports a TO PROGRAM clause that enables shell command execution, transforming what might otherwise be a data injection issue into full Remote Code Execution.

Root Cause

The vulnerability has two fundamental causes. First, Excel sheet names provided by users are concatenated directly into PostgreSQL table names without any input validation or sanitization. Second, these table names are embedded into SQL COPY statements using Python f-strings instead of using parameterized queries or proper identifier quoting through PostgreSQL's built-in escaping mechanisms.

Attack Vector

An attacker can exploit this vulnerability using a sophisticated two-stage technique designed to bypass the 31-character Excel sheet name limit. In the first stage, the attacker uploads a normal Excel file containing shell commands in its data rows. In the second stage, the attacker uploads an XML-tampered Excel file with a maliciously crafted sheet name that injects a TO PROGRAM 'sh' clause into the SQL statement.

This two-stage approach allows the attacker to first plant the payload and then trigger its execution, effectively circumventing character length restrictions that would otherwise limit the attack surface.

python
 import traceback
 import uuid
 from io import StringIO
+from psycopg2 import sql
 from typing import List
 from urllib.parse import quote

Source: GitHub Security Patch

The fix introduces psycopg2.sql.Identifier to properly escape and quote table names, preventing SQL injection through sheet name manipulation.

Detection Methods for CVE-2026-32950

Indicators of Compromise

  • Unusual activity on the /api/v1/datasource/uploadExcel endpoint, particularly multiple sequential uploads from the same authenticated user
  • PostgreSQL logs showing COPY statements with suspicious TO PROGRAM clauses or unusual table names
  • Process creation events showing shell commands spawned by the postgres user (uid=999)
  • Unexpected file access patterns, particularly reads of sensitive system files like /etc/passwd or /etc/shadow

Detection Strategies

  • Monitor PostgreSQL query logs for COPY statements containing TO PROGRAM clauses, which are unusual in normal application operation
  • Implement file integrity monitoring on sensitive system files to detect unauthorized access or exfiltration attempts
  • Analyze Excel file uploads for XML tampering or anomalous sheet name patterns that exceed typical naming conventions
  • Deploy endpoint detection rules to identify process chains originating from PostgreSQL processes executing shell commands

Monitoring Recommendations

  • Enable verbose PostgreSQL logging including statement logging to capture all SQL queries for forensic analysis
  • Implement network-level monitoring for data exfiltration patterns from PostgreSQL server hosts
  • Configure alerting on any process execution by the postgres system user outside of expected database operations
  • Monitor authentication logs for the SQLBot application to track all user access to the vulnerable endpoint

How to Mitigate CVE-2026-32950

Immediate Actions Required

  • Upgrade SQLBot to version 1.7.0 or later immediately, as this version contains the security fix
  • If immediate upgrade is not possible, disable or restrict access to the /api/v1/datasource/uploadExcel endpoint
  • Review PostgreSQL logs for signs of prior exploitation and investigate any suspicious COPY TO PROGRAM statements
  • Audit user accounts with access to the upload functionality and enforce principle of least privilege

Patch Information

Fit2cloud has released version 1.7.0 of SQLBot which addresses this vulnerability. The fix implements proper SQL identifier escaping using psycopg2.sql.Identifier to prevent malicious input from being interpreted as SQL syntax. For detailed information, see the GitHub Security Advisory GHSA-7hww-8rj5-7rmm and the patch commit.

Workarounds

  • Implement network-level access controls to restrict access to the /api/v1/datasource/uploadExcel endpoint to trusted administrators only
  • Deploy a Web Application Firewall (WAF) rule to inspect and block Excel uploads containing suspicious sheet names or XML content
  • Disable the Excel upload functionality entirely if it is not critical to business operations until the patch can be applied
  • Configure PostgreSQL to run with reduced privileges and disable the COPY TO PROGRAM functionality if not required
bash
# Configuration example - Restrict PostgreSQL COPY TO PROGRAM capability
# Add to postgresql.conf to log all COPY statements for monitoring
log_statement = 'all'
log_min_duration_statement = 0

# Consider running PostgreSQL in a containerized environment with restricted capabilities
# or use pg_hba.conf to limit connections to trusted hosts only

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSQLI

  • Vendor/TechFit2cloud Sqlbot

  • SeverityHIGH

  • CVSS Score8.6

  • EPSS Probability0.18%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-78
  • Technical References
  • GitHub Release v1.7.0
  • Vendor Resources
  • GitHub Commit Message

  • GitHub Security Advisory GHSA-7hww-8rj5-7rmm
  • Related CVEs
  • CVE-2026-32949: Fit2cloud SQLBot SSRF Vulnerability

  • CVE-2025-15598: Fit2cloud Sqlbot Auth Bypass Vulnerability

  • CVE-2025-15597: Fit2cloud Sqlbot Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English