CVE-2025-67510: Neuron MySQLWriteTool allows arbitrary/destructive SQL when exposed to untrusted prompts (agent “footgun”)
(updated )
MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions.
This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions).
Who is impacted: Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges.
References
- github.com/advisories/GHSA-898v-775g-777c
- github.com/neuron-core/neuron-ai
- github.com/neuron-core/neuron-ai/commit/44bab85d92bf162898ee48d0bcef6ba0d29b59c9
- github.com/neuron-core/neuron-ai/releases/tag/2.8.12
- github.com/neuron-core/neuron-ai/security/advisories/GHSA-898v-775g-777c
- nvd.nist.gov/vuln/detail/CVE-2025-67510
Code Behaviors & Features
Detect and mitigate CVE-2025-67510 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →