Adminer 4.8.1, when using Monolog for logging, allows a Denial of Service (memory consumption) via a crafted serialized payload (e.g., using s:1000000000), leading to a PHP Object Injection issue. Remote, unauthenticated attackers can trigger this by sending a malicious serialized object, which forces excessive memory usage, rendering Adminer’s interface unresponsive and causing a server-level DoS. While the server may recover after several minutes, multiple simultaneous requests can cause a complete crash requiring manual intervention.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-25694 Adminer PHP Object Injection issue leads to Denial of Service
Github GHSA Github GHSA GHSA-mqh4-2mm8-g7w9 Adminer PHP Object Injection issue leads to Denial of Service
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 12 Sep 2025 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:adminer:adminer:4.8.1:*:*:*:*:*:*:*

Mon, 25 Aug 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Adminer
Adminer adminer
Vendors & Products Adminer
Adminer adminer

Mon, 25 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 25 Aug 2025 13:30:00 +0000

Type Values Removed Values Added
Description Adminer 4.8.1, when using Monolog for logging, allows a Denial of Service (memory consumption) via a crafted serialized payload (e.g., using s:1000000000), leading to a PHP Object Injection issue. Remote, unauthenticated attackers can trigger this by sending a malicious serialized object, which forces excessive memory usage, rendering Adminer’s interface unresponsive and causing a server-level DoS. While the server may recover after several minutes, multiple simultaneous requests can cause a complete crash requiring manual intervention.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-08-25T13:39:13.594Z

Reserved: 2025-04-20T00:00:00.000Z

Link: CVE-2025-43960

cve-icon Vulnrichment

Updated: 2025-08-25T13:38:02.697Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-25T14:15:30.893

Modified: 2025-09-12T20:16:45.047

Link: CVE-2025-43960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-25T21:53:02Z