Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60797: n/a

0
Medium
VulnerabilityCVE-2025-60797cvecve-2025-60797
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data->conn->Execute($_REQUEST['query']). An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to complete database compromise, data theft, or privilege escalation.

AI-Powered Analysis

AILast updated: 11/20/2025, 15:21:11 UTC

Technical Analysis

CVE-2025-60797 identifies a critical SQL injection vulnerability in phpPgAdmin, a popular web-based administration tool for PostgreSQL databases. The vulnerability exists in the dataexport.php file at line 118, where the application directly executes SQL queries provided by users through the $_REQUEST['query'] parameter without any form of sanitization or use of prepared statements. This insecure coding practice allows an authenticated attacker to inject arbitrary SQL commands, which the backend PostgreSQL database executes with the privileges of the phpPgAdmin database user. The consequences of exploitation include unauthorized data access, data modification, deletion, or even privilege escalation within the database system. Since phpPgAdmin is often used to manage critical database infrastructure, this vulnerability poses a significant risk to confidentiality, integrity, and availability of data. Although no public exploits have been reported yet, the vulnerability's nature makes it highly exploitable by any authenticated user with access to the vulnerable interface. The lack of a CVSS score means severity must be inferred from the technical details: the vulnerability requires authentication but no user interaction beyond submitting crafted SQL queries. The scope is limited to systems running vulnerable phpPgAdmin versions, but these systems often manage sensitive data, increasing the impact. The vulnerability was reserved in late September 2025 and published in November 2025, indicating recent discovery and disclosure. No patches or mitigations are currently linked, emphasizing the need for immediate defensive measures.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Many enterprises, government agencies, and service providers in Europe rely on PostgreSQL databases managed via phpPgAdmin for critical applications. Exploitation could lead to unauthorized disclosure of sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, attackers could alter or delete data, disrupting business operations or causing financial losses. Privilege escalation within the database could allow attackers to pivot to other internal systems, increasing the attack surface. The vulnerability's requirement for authentication limits exposure but does not eliminate risk, as attackers may leverage stolen credentials or exploit weak authentication mechanisms. Organizations with web-facing phpPgAdmin instances are particularly vulnerable to remote exploitation. The absence of known exploits currently provides a window for proactive defense, but the critical nature of the flaw demands swift action to prevent potential breaches.

Mitigation Recommendations

1. Immediately restrict access to phpPgAdmin interfaces to trusted internal networks or VPNs to reduce exposure. 2. Implement strong authentication controls, including multi-factor authentication, to prevent unauthorized access. 3. Monitor and audit phpPgAdmin access logs for suspicious activity indicative of SQL injection attempts. 4. Until an official patch is released, consider disabling or removing the dataexport.php functionality or the entire phpPgAdmin tool if feasible. 5. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the $_REQUEST['query'] parameter. 6. Review and harden database user privileges associated with phpPgAdmin to minimize the impact of potential exploitation. 7. Once patches become available, apply them promptly and verify that input sanitization and parameterized queries are enforced. 8. Educate administrators about the risks of executing arbitrary SQL queries through management tools and enforce least privilege principles. 9. Conduct regular vulnerability assessments and penetration tests focusing on database management interfaces. 10. Maintain an incident response plan to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f2ef845657ce9d4e9f7b7

Added to database: 11/20/2025, 3:08:40 PM

Last enriched: 11/20/2025, 3:21:11 PM

Last updated: 11/22/2025, 2:21:17 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats