CVE-2025-60797

Source
https://cve.org/CVERecord?id=CVE-2025-60797
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-60797.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-60797
Aliases
Downstream
Published
2025-11-20T15:17:38.250Z
Modified
2026-03-13T03:40:11.038728Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data->conn->Execute($_REQUEST['query']). An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to complete database compromise, data theft, or privilege escalation.

References

Affected packages

Git / github.com/phppgadmin/phppgadmin

Affected ranges

Type
GIT
Repo
https://github.com/phppgadmin/phppgadmin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "7.13.0"
        }
    ]
}

Affected versions

Other
REL_0-5-0
REL_0-6-0
REL_0-6-5
REL_3-0-0-DEV-1
REL_3-0-0-DEV-2
REL_3-0-0-DEV-3
REL_3-0-0-DEV-4
REL_3-0-BETA-1
REL_3-0-RC-1
REL_3-0-RC-2
REL_3-1-BETA-1
REL_3-1-RC-1
REL_4-1-BETA-1
REL_4-2-BETA-1
REL_4-2-BETA-2
REL_5-0-BETA-1
REL_5-0-BETA-2
REL_5-1-0
REL_5-6-0
REL_7-12-1
REL_7-13-0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-60797.json"