phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in display.php at line 396. The application passes user-controlled input from $_REQUEST['query'] directly to the browseQuery function without proper sanitization. An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands through malicious query manipulation, potentially leading to complete database compromise.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g6xh-wrpf-v6j6 phppgadmin contains a SQL injection vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 26 Nov 2025 04:15:00 +0900

Type Values Removed Values Added
First Time appeared Phppgadmin Project
Phppgadmin Project phppgadmin
CPEs cpe:2.3:a:phppgadmin_project:phppgadmin:*:*:*:*:*:*:*:*
Vendors & Products Phppgadmin Project
Phppgadmin Project phppgadmin

Mon, 24 Nov 2025 18:15:00 +0900

Type Values Removed Values Added
First Time appeared Phppgadmin
Phppgadmin phppgadmin
Vendors & Products Phppgadmin
Phppgadmin phppgadmin

Sat, 22 Nov 2025 01:15:00 +0900

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 07:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 00:15:00 +0900

Type Values Removed Values Added
Description phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in display.php at line 396. The application passes user-controlled input from $_REQUEST['query'] directly to the browseQuery function without proper sanitization. An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands through malicious query manipulation, potentially leading to complete database compromise.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-21T15:38:02.007Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60798

cve-icon Vulnrichment

Updated: 2025-11-20T21:33:22.878Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-20T15:17:38.393

Modified: 2025-11-25T19:11:51.460

Link: CVE-2025-60798

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-24T18:10:37Z

Weaknesses