Description
A weakness has been identified in phpipam up to 1.7.4. The impacted element is an unknown function of the file app/admin/sections/edit-result.php of the component Section Handler. Executing a manipulation of the argument subnetOrdering can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-15
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch
AI Analysis

Impact

A weakness exists in phpipam up to version 1.7.4 within the Section Handler component, specifically in the file app/admin/sections/edit-result.php. The subnetOrdering parameter is processed without adequate sanitization, allowing a remote attacker to inject arbitrary SQL and execute it against the database. The flaw is classified as CWE‑74 and CWE‑89. Based on the description, it is inferred that an attacker could potentially read, modify, or delete data stored in the database through crafted SQL statements.

Affected Systems

All installations of phpipam version 1.7.4 or earlier are affected. The vulnerability is tied to the Section Handler feature accessed via the app/admin/sections/edit-result.php endpoint. No more granular version information is available in the data provided.

Risk and Exploitability

The CVSS base score is 5.1, indicating moderate severity. The EPSS score is less than 1 %, suggesting a low current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, requiring crafted HTTP requests to the vulnerable endpoint. No vendor patch or workaround has been released, and the vendor did not respond to notifications. Until remediation is applied, the risk remains high for systems that allow modification of sections.

Generated by OpenCVE AI on March 16, 2026 at 23:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the phpipam vendor site for an official patch or upgrade to a non‑vulnerable version.
  • If no patch is available, restrict or disable access to the Section Handler edit functionality for non‑trusted users.
  • If code changes are possible, implement input validation and use parameterized queries for the subnetOrdering input to prevent injection.
  • Limit the privileges of the phpipam database user to the minimum required for normal operation.
  • Monitor web and database logs for suspicious activity involving edit-result.php requests.

Generated by OpenCVE AI on March 16, 2026 at 23:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 15 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in phpipam up to 1.7.4. The impacted element is an unknown function of the file app/admin/sections/edit-result.php of the component Section Handler. Executing a manipulation of the argument subnetOrdering can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title phpipam Section edit-result.php sql injection
First Time appeared Phpipam
Phpipam phpipam
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*
Vendors & Products Phpipam
Phpipam phpipam
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T20:09:17.428Z

Reserved: 2026-03-14T22:31:15.530Z

Link: CVE-2026-4189

cve-icon Vulnrichment

Updated: 2026-03-16T20:09:10.699Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:20:01.943

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:14Z

Weaknesses