{"vulnerability": "CVE-2026-33324", "sightings": [{"uuid": "b0e375a2-a2ac-41aa-a0a5-76dd4abd4c4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33324", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml56apcdmp2q", "content": "CVE-2026-33324 - SQLBot prompt injection allows arbitrary SQL execution and remote code execution\nCVE ID : CVE-2026-33324\n \n Published : May 5, 2026, 8:16 p.m. | 22\u00a0minutes ago\n \n Description : SQLBot is an intelligent Text-to-SQL system based on large language models and RAG....", "creation_timestamp": "2026-05-05T21:51:40.736255Z"}, {"uuid": "d6259a05-d9d5-4a54-9001-e296dbf3d81d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33324", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml5piwum6i2f", "content": "CRITICAL SQL injection in dataease SQLBot &lt;1.7.1 allows authenticated attackers to execute arbitrary SQL and trigger RCE on PostgreSQL. Patch to 1.7.1+ now! https://radar.offseq.com/threat/cve-2026-33324-cwe-89-improper-neutralization-of-s-5605c7fd #OffSeq #SQLInjection #Vulnerability", "creation_timestamp": "2026-05-06T03:00:31.152077Z"}, {"uuid": "f1b9126a-5871-4ce2-b71e-69f48a5d2bdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33324", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116525395376655802", "content": "\ud83d\udea8 CRITICAL: dataease SQLBot &lt;1.7.1 (CVE-2026-33324) is vulnerable to SQL injection via prompt injection. Authenticated users can trigger RCE on PostgreSQL. Upgrade to 1.7.1+ now! https://radar.offseq.com/threat/cve-2026-33324-cwe-89-improper-neutralization-of-s-5605c7fd #OffSeq #SQLInjection #Vuln", "creation_timestamp": "2026-05-06T03:00:48.696960Z"}]}