A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.
Use CWE-345, Fit2cloud vendor hub and Sqlbot product page to widen CVE-2025-15598 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-32949, CVE-2026-32950 and CVE-2026-32622 for nearby disclosures in the same product family.