Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g6xh-wrpf-v6j6 | phppgadmin contains a SQL injection vulnerability |
Tue, 25 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phppgadmin Project
Phppgadmin Project phppgadmin |
|
| CPEs | cpe:2.3:a:phppgadmin_project:phppgadmin:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Phppgadmin Project
Phppgadmin Project phppgadmin |
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phppgadmin
Phppgadmin phppgadmin |
|
| Vendors & Products |
Phppgadmin
Phppgadmin phppgadmin |
Fri, 21 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 20 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Thu, 20 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in display.php at line 396. The application passes user-controlled input from $_REQUEST['query'] directly to the browseQuery function without proper sanitization. An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands through malicious query manipulation, potentially leading to complete database compromise. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-21T15:38:02.007Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60798
Updated: 2025-11-20T21:33:22.878Z
Status : Analyzed
Published: 2025-11-20T15:17:38.393
Modified: 2025-11-25T19:11:51.460
Link: CVE-2025-60798
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:10:37Z
Github GHSA