phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data->conn->Execute($_REQUEST['query']). An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to complete database compromise, data theft, or privilege escalation.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-927w-vq5c-8gc3 phppgadmin contains a SQL injection vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Phppgadmin Project
Phppgadmin Project phppgadmin
CPEs cpe:2.3:a:phppgadmin_project:phppgadmin:*:*:*:*:*:*:*:*
Vendors & Products Phppgadmin Project
Phppgadmin Project phppgadmin

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Phppgadmin
Phppgadmin phppgadmin
Vendors & Products Phppgadmin
Phppgadmin phppgadmin

Fri, 21 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Description phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data->conn->Execute($_REQUEST['query']). An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to complete database compromise, data theft, or privilege escalation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-21T15:38:33.842Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60797

cve-icon Vulnrichment

Updated: 2025-11-20T21:27:40.771Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-20T15:17:38.250

Modified: 2025-11-25T19:13:30.203

Link: CVE-2025-60797

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-24T09:10:34Z