VYPR
Critical severityNVD Advisory· Published Dec 10, 2025· Updated Dec 11, 2025

MySQLWriteTool allows arbitrary/destructive SQL when exposed to untrusted prompts (agent “footgun”)

CVE-2025-67510

Description

Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MySQLWriteTool in Neuron PHP framework <=2.8.11 allows arbitrary SQL execution via prompt injection, enabling destructive database queries.

Summary

CVE-2025-67510 affects the MySQLWriteTool in the Neuron PHP framework (versions 2.8.11 and below). The tool executes arbitrary SQL provided by the caller using PDO::prepare() and execute() without semantic restrictions [1][2]. While this behavior is intentional for legitimate database write operations, in the context of an LLM agent it becomes a high-risk capability [2][3].

Root

Cause and Exploitation

The vulnerability is rooted in the lack of semantic validation on SQL queries passed to the MySQLWriteTool [2]. An attacker can leverage prompt injection or indirect prompt manipulation to coerce the agent into executing destructive SQL commands [2][3]. The attack surface is agents exposed to untrusted input, such as public-facing chatbots or tools that process user-supplied prompts [2][3]. No additional authentication is required beyond the agent's existing database user permissions [2].

Impact

Successful exploitation can result in execution of arbitrary SQL statements including DROP TABLE, TRUNCATE, DELETE, ALTER, and privilege-related statements [2][3]. The actual impact depends on the database user's permissions – if the agent's DB user has broad privileges, an attacker could drop entire tables or modify database schemas [2]. This could lead to data loss, service disruption, or unauthorized data manipulation [2].

Mitigation

The issue is fixed in version 2.8.12 [2][3]. The commit [4] shows that the fix adds a keyword validation layer that rejects dangerous statements. Recommended workarounds include disabling MySQLWriteTool for untrusted agents, using a dedicated least-privilege DB user, and implementing application-layer policy to block high-risk SQL commands [3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
neuron-core/neuron-aiPackagist
< 2.8.122.8.12

Affected products

1

Patches

1
44bab85d92bf

fix security vulnerability in mysql tools

https://github.com/neuron-core/neuron-aiValerio BarberaNov 24, 2025via ghsa
1 file changed · +1 1
  • src/Tools/Toolkits/MySQL/MySQLWriteTool.php+1 1 modified
    @@ -97,7 +97,7 @@ public function __invoke(string $query, ?array $parameters = []): string
             return "Query executed successfully. {$rowCount} row(s) affected.";
         }
     
    -    protected function validate($query): bool
    +    protected function validate(string $query): bool
         {
             // Check for forbidden keywords that might be in subqueries
             foreach ($this->forbiddenStatements as $forbidden) {
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.