| عنوان | MAC-SQL The latest version SQL Injection |
|---|
| الوصف | MAC-SQL is a multi-agent collaborative Text-to-SQL framework that utilizes large language models (LLMs) to convert natural language queries into SQL statements. The system processes user input through three agents (Selector, Decomposer, and Refiner) and executes the generated SQL against SQLite databases without proper validation or sanitization.
The vulnerability exists in the complete trust chain between user input, LLM output, and SQL execution. Malicious users can exploit this through prompt injection attacks, manipulating the LLM to generate arbitrary SQL statements that are then executed directly on the database server. The core issue is located in the Refiner agent's _execute_sql method (core/agents.py:672-698), which executes LLM-generated SQL without any filtering:
While a 120-second timeout is implemented, it is totally enough for crashing the server |
|---|
| المصدر | ⚠️ https://github.com/Ka7arotto/cve/blob/main/MAC-SQL/issue.md |
|---|
| المستخدم | Goku (UID 80486) |
|---|
| ارسال | 21/03/2026 02:38 AM (27 أيام منذ) |
|---|
| الاعتدال | 04/04/2026 11:50 PM (15 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 355386 [wbbeyourself MAC-SQL حتى 31a9df5e0d520be4769be57a4b9022e5e34a14f4 Refiner Agent core/agents.py _execute_sql حقن SQL] |
|---|
| النقاط | 20 |
|---|