Impact
A weakness exists in phpipam up to version 1.7.4 within the Section Handler component, specifically in the file app/admin/sections/edit-result.php. The subnetOrdering parameter is processed without adequate sanitization, allowing a remote attacker to inject arbitrary SQL and execute it against the database. The flaw is classified as CWE‑74 and CWE‑89. Based on the description, it is inferred that an attacker could potentially read, modify, or delete data stored in the database through crafted SQL statements.
Affected Systems
All installations of phpipam version 1.7.4 or earlier are affected. The vulnerability is tied to the Section Handler feature accessed via the app/admin/sections/edit-result.php endpoint. No more granular version information is available in the data provided.
Risk and Exploitability
The CVSS base score is 5.1, indicating moderate severity. The EPSS score is less than 1 %, suggesting a low current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, requiring crafted HTTP requests to the vulnerable endpoint. No vendor patch or workaround has been released, and the vendor did not respond to notifications. Until remediation is applied, the risk remains high for systems that allow modification of sections.
OpenCVE Enrichment