Tillywork versions v0.1.3 and below are affected by a critical SQL Injection vulnerability. This flaw is specifically located within the app/common/helpers/query.builder.helper.ts
file. An authenticated user can exploit this vulnerability to inject malicious SQL commands, enabling the execution of arbitrary queries against the server.
Basic Information
- Researcher: Kusol Watchara-Apanukorn (Head of research and community)
- Project link: https://github.com/tillywork/tillywork
- Hot fixed: https://github.com/tillywork/tillywork/pull/288
- Tested version: v0.1.3 – Collaboration
Proof of Concept
1. Insert single quote in value
while using in
operator. The server will respond 500 internal error.
![[CVE-2025-60514] Tillywork — SQL Injection (Public Disclosure)](https://www.secstrike.ai/wp-content/uploads/2025/10/image-1024x536.png)
2. We could see the SQL syntax error in the server log.
![[CVE-2025-60514] Tillywork — SQL Injection (Public Disclosure)](https://www.secstrike.ai/wp-content/uploads/2025/10/image-1-1024x160.png)
Root cause: the server accept the direct value concatenation in IN
and NIN
clauses without parameterization
![[CVE-2025-60514] Tillywork — SQL Injection (Public Disclosure)](https://www.secstrike.ai/wp-content/uploads/2025/10/image-2.png)
![[CVE-2025-60514] Tillywork — SQL Injection (Public Disclosure)](https://www.secstrike.ai/wp-content/uploads/2025/10/image-3.png)