CVE-2026-25892

Source
https://cve.org/CVERecord?id=CVE-2026-25892
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25892.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25892
Aliases
Downstream
Published
2026-02-09T21:26:45.224Z
Modified
2026-02-20T02:45:37.033225Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Adminer has an Unauthenticated Persistent DoS via Array Injection in ?script=version Endpoint
Details

Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25892.json",
    "cwe_ids": [
        "CWE-20"
    ]
}
References

Affected packages

Git / github.com/vrana/adminer

Affected ranges

Type
GIT
Repo
https://github.com/vrana/adminer
Events

Affected versions

v4.*
v4.16.0
v4.17.0
v4.17.1
v4.6.2
v4.6.3
v4.7.0
v4.7.1
v4.7.2
v4.7.3
v4.7.4
v4.7.5
v4.7.7
v4.7.8
v4.7.9
v4.8.0
v4.8.1
v5.*
v5.0.0
v5.0.1
v5.0.2
v5.0.3
v5.0.4
v5.0.5
v5.0.6
v5.1.0
v5.1.1
v5.2.0
v5.2.1
v5.3.0
v5.4.0
v5.4.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25892.json"