DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2025-7709: CVE-2025-7709: Heap-Based Out-of-Bounds Write via Integer Overflow in SQLite FTS5

CVE-2025-7709: Heap-Based Out-of-Bounds Write via Integer Overflow in SQLite FTS5

Vulnerability ID: CVE-2025-7709
CVSS Score: 6.9
Published: 2025-09-08

An integer overflow vulnerability exists in the SQLite Full-Text Search (FTS5) extension, leading to a heap-based out-of-bounds write. The flaw occurs due to a truncation error when calculating the memory allocation size for tombstone pointers. This vulnerability affects SQLite versions 3.49.1 up to but not including 3.50.3.

TL;DR

The SQLite FTS5 extension contains an integer overflow flaw (CVE-2025-7709) causing an out-of-bounds write of tombstone pointers due to a 64-bit to 32-bit truncation during memory allocation.


⚠️ Exploit Status: POC

Technical Details

  • CWE ID: CWE-190
  • Attack Vector: Network (AV:N)
  • CVSS Score: 6.9
  • EPSS Score: 0.00057
  • Impact: Integrity, Availability, Potential RCE
  • Exploit Status: Proof-of-Concept
  • KEV Status: Not Listed

Affected Systems

  • Ubuntu
  • Debian
  • SUSE
  • Amazon Linux
  • Photon OS
  • Oracle Solaris
  • VMware vCenter
  • Dell VxRail
  • Trend Micro Endpoint Encryption
  • SQLite FTS5: >= 3.49.1, < 3.50.3 (Fixed in: 3.50.3)

Exploit Details

Mitigation Strategies

  • Upgrade SQLite library to version 3.50.3 or higher.
  • Implement strict input validation and sanitize all user-provided data influencing FTS5 queries.
  • Restrict access to FTS5 virtual tables for low-privileged or unauthenticated users.
  • Compile SQLite from source without the FTS5 extension if full-text search is not required.

Remediation Steps:

  1. Identify all systems, applications, and language runtimes utilizing SQLite via Software Composition Analysis.
  2. Verify the current version of the SQLite library (target versions between 3.49.1 and 3.50.2 are vulnerable).
  3. Deploy updated operating system packages (e.g., libsqlite3) supplied by the vendor.
  4. Recompile statically linked applications with the updated SQLite source code.
  5. Monitor application logs for excessive memory allocation errors or unexpected crashes related to FTS5.

References


Read the full report for CVE-2025-7709 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)