Browse all 7 CVE security advisories affecting SQLite. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SQLite serves as a lightweight, serverless database engine embedded in countless applications, from mobile apps to browsers. Historically, vulnerabilities have included remote code execution, buffer overflows, and privilege escalation, often stemming from parsing flaws or unsafe configurations. While generally secure, its widespread deployment means even minor issues can impact numerous systems. Notable incidents include vulnerabilities in browser implementations and third-party libraries that exposed users to data theft or arbitrary code execution. The project maintains a strong security response, but its embedded nature and extensive use make it a persistent target for exploitation, with seven CVEs currently documented.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-7458 | SQLite integer overflow in key info allocation may lead to information disclosure. — SQLiteCWE-190 | 9.1 | - | 2025-07-29 |
| CVE-2025-6965 | Integer Truncation on SQLite — SQLiteCWE-197 | 7.5 | - | 2025-07-15 |
| CVE-2025-3277 | SQLite 安全漏洞 — sqliteCWE-122 | 9.8AI | CriticalAI | 2025-04-14 |
| CVE-2025-29088 | SQLite 安全漏洞 — SQLiteCWE-190 | 5.6 | Medium | 2025-04-10 |
| CVE-2025-29087 | SQLite 安全漏洞 — SQLiteCWE-190 | 3.2 | Low | 2025-04-07 |
This page lists every published CVE security advisory associated with SQLite. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.