Description
Pimcore is an Open Source Data & Experience Management Platform. In versions up to and including 11.5.14.1 and 12.3.2, the filter query parameter in the dependency listing endpoints is JSON-decoded and the value field is concatenated directly into RLIKE clauses without sanitization or parameterized queries. Exploiting this issue requires admin authentication. An attacker with admin panel access can extract the full database including password hashes of other admin users. Version 12.3.3 contains a patch.
Published: 2026-02-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection enabling extraction of database contents including password hashes
Action: Immediate Patch
AI Analysis

Impact

Pimcore, an open source data and experience management platform, was found to have a flaw in how it handles filter query parameters for its dependency listing endpoints. The value field of the JSON‑decoded filter is concatenated directly into an RLIKE clause without sanitization or use of parameterized queries. This oversight allows an authenticated attacker with access to the administration panel to inject arbitrary SQL into the backend query. The resulting injection can read the entire database, giving the attacker password hashes of other admin users and a full view of confidential data. The weakness is a classic example of unsafe input handling, identified as CWE‑89.

Affected Systems

The vulnerability affects all installations of Pimcore up to and including version 11.5.14.1 and 12.3.2. The patch was released with version 12.3.3. Administrators should check the installed package version and apply the update if they are running a vulnerable release.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, but the EPSS score of less than 1 % suggests very low current exploitation probability. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploit requires admin authentication and a request to the dependency listing API, so the vector is authenticated internal. An attacker who can log into the administration panel can leverage the injection to extract the complete database and recover password hashes, providing long‑term access and severe confidentiality compromise.

Generated by OpenCVE AI on April 17, 2026 at 15:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Pimcore to version 12.3.3 or later, which contains the fixed query handling code.
  • If upgrading is temporarily infeasible, restrict or disable the dependency listing endpoint for non‑admin users and enforce strict access controls.
  • Sanitize any custom or legacy filter inputs by using parameterized queries or escaping to prevent injection into RLIKE clauses.
  • Monitor system logs for unauthorized database access attempts and verify that admin credentials remain protected.

Generated by OpenCVE AI on April 17, 2026 at 15:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vxg3-v4p6-f3fp Pimcore vulnerable to SQL injection via unsanitized filter value in Dependency Dao RLIKE clause
History

Wed, 25 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Wed, 25 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Pimcore
Pimcore pimcore
Vendors & Products Pimcore
Pimcore pimcore

Tue, 24 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description Pimcore is an Open Source Data & Experience Management Platform. In versions up to and including 11.5.14.1 and 12.3.2, the filter query parameter in the dependency listing endpoints is JSON-decoded and the value field is concatenated directly into RLIKE clauses without sanitization or parameterized queries. Exploiting this issue requires admin authentication. An attacker with admin panel access can extract the full database including password hashes of other admin users. Version 12.3.3 contains a patch.
Title Pimcore vulnerable to SQL injection via unsanitized filter value in Dependency Dao RLIKE clause
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-24T18:58:07.625Z

Reserved: 2026-02-19T17:25:31.100Z

Link: CVE-2026-27461

cve-icon Vulnrichment

Updated: 2026-02-24T18:56:41.952Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T04:15:58.787

Modified: 2026-02-25T19:11:17.440

Link: CVE-2026-27461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses