Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r63p-v37q-g74c | phppgadmin contains an incorrect access control vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 21 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 20 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. Attackers can exploit this to store arbitrary SQL queries in $_SESSION['sqlquery'] by manipulating these parameters, potentially leading to session poisoning, stored cross-site scripting, or unauthorized access to sensitive session data. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-20T21:34:31.713Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60799
Updated: 2025-11-20T21:34:24.517Z
Status : Awaiting Analysis
Published: 2025-11-20T15:17:38.533
Modified: 2025-11-21T15:13:13.800
Link: CVE-2025-60799
No data.
OpenCVE Enrichment
No data.
Github GHSA