Pimcore is an open source data and experience management platform. Prior to version 10.5.19, since a user with 'report' permission can already write arbitrary SQL queries and given the fact that this endpoint is using the GET method (no CSRF protection), an attacker can inject an arbitrary query by manipulating a user to click on a link. Users should upgrade to version 10.5.19 to receive a patch or, as a workaround, may apply the patch manually.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1109 Pimcore is an open source data and experience management platform. Prior to version 10.5.19, since a user with 'report' permission can already write arbitrary SQL queries and given the fact that this endpoint is using the GET method (no CSRF protection), an attacker can inject an arbitrary query by manipulating a user to click on a link. Users should upgrade to version 10.5.19 to receive a patch or, as a workaround, may apply the patch manually.
Github GHSA Github GHSA GHSA-vf7q-g2pv-jxvx Pimcore vulnerable to improper quoting of filters in Custom Reports
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-25T14:51:11.306Z

Reserved: 2023-03-15T15:59:10.054Z

Link: CVE-2023-28438

cve-icon Vulnrichment

Updated: 2024-08-02T12:38:25.461Z

cve-icon NVD

Status : Modified

Published: 2023-03-22T21:15:18.520

Modified: 2024-11-21T07:55:04.020

Link: CVE-2023-28438

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.