Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-927w-vq5c-8gc3 | phppgadmin contains a SQL injection vulnerability |
Tue, 25 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phppgadmin Project
Phppgadmin Project phppgadmin |
|
| CPEs | cpe:2.3:a:phppgadmin_project:phppgadmin:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Phppgadmin Project
Phppgadmin Project phppgadmin |
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phppgadmin
Phppgadmin phppgadmin |
|
| Vendors & Products |
Phppgadmin
Phppgadmin phppgadmin |
Fri, 21 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 20 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Thu, 20 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data->conn->Execute($_REQUEST['query']). An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to complete database compromise, data theft, or privilege escalation. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-21T15:38:33.842Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60797
Updated: 2025-11-20T21:27:40.771Z
Status : Analyzed
Published: 2025-11-20T15:17:38.250
Modified: 2025-11-25T19:13:30.203
Link: CVE-2025-60797
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:10:34Z
Github GHSA