Skip to main content
Version: latest

CVE-2025-3277

CVE Details

Visit the official vulnerability details page for CVE-2025-3277 to learn more.

Initial Publication

04/16/2025

Last Update

09/15/2025

Third Party Dependency

sqlite-libs

NIST CVE Summary

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVE Severity

undefined

Our Official Summary

An integer overflow vulnerability has been identified in SQLite's concat_ws() function. The issue occurs when processing specific database queries, where the resulting truncated integer is used as a length parameter for memory allocation, potentially leading to crashes, unpredictable behavior, data corruption, or in some cases, arbitrary code execution.

This vulnerability has been reported in python libraries images used by the process to run kube-hunter.

In the affected images, multiple security controls are already in place:

  • The images are execute only when kube-hunter functionality is executed.
  • An attacker would require privileged access within the cluster to attempt exploitation.
  • The containers do not permit arbitrary code execution, further mitigating risk.

As a result, the practical impact of this vulnerability is low, with the containerized deployment model significantly reducing the overall attack surface.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.7.16⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.6.41⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact

Revision History

DateRevision
09/15/2025Status changed from Open to Ongoing
09/15/2025Official summary added