Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60799: n/a

0
Unknown
VulnerabilityCVE-2025-60799cvecve-2025-60799
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. Attackers can exploit this to store arbitrary SQL queries in $_SESSION['sqlquery'] by manipulating these parameters, potentially leading to session poisoning, stored cross-site scripting, or unauthorized access to sensitive session data.

AI-Powered Analysis

AILast updated: 11/20/2025, 15:23:50 UTC

Technical Analysis

CVE-2025-60799 is a security vulnerability identified in phpPgAdmin, a popular web-based administration tool for PostgreSQL databases. The vulnerability exists in the sql.php script, specifically between lines 68 and 76, where the application improperly handles user-supplied parameters such as 'subject', 'server', 'database', and 'queryid'. These parameters are used to manipulate session variables without adequate validation or access control checks. As a result, an attacker can inject arbitrary SQL queries into the $_SESSION['sqlquery'] variable, effectively poisoning the session. This session poisoning can lead to stored cross-site scripting (XSS) attacks, where malicious scripts are persistently stored and executed in the context of the victim's browser, potentially compromising user credentials or session tokens. Additionally, unauthorized access to sensitive session data can occur, undermining the confidentiality and integrity of the session. The vulnerability does not require prior authentication, increasing its risk profile, and can be exploited by sending crafted HTTP requests to the vulnerable phpPgAdmin instance. Although no public exploits have been reported yet, the flaw poses a significant risk to environments where phpPgAdmin is deployed, especially if accessible over the internet or within poorly segmented networks. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed, but the technical details suggest a high potential impact on session security and database administration integrity.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to PostgreSQL database management interfaces, potentially exposing sensitive business data or enabling further compromise of internal systems. Organizations relying on phpPgAdmin for database administration, particularly those with web-accessible instances, face risks of session hijacking, data leakage, and execution of malicious scripts within administrative sessions. This could disrupt database operations, lead to data integrity issues, or facilitate lateral movement by attackers. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government, where unauthorized data exposure could result in regulatory penalties under GDPR. Additionally, session poisoning and stored XSS could be leveraged to escalate privileges or bypass authentication controls, increasing the threat surface. The absence of known exploits in the wild provides a window for proactive mitigation, but the vulnerability's nature demands urgent attention to prevent exploitation.

Mitigation Recommendations

1. Restrict access to phpPgAdmin interfaces by limiting exposure to trusted networks or via VPNs to reduce attack surface. 2. Implement strict input validation and sanitization on all parameters accepted by sql.php, especially 'subject', 'server', 'database', and 'queryid', to prevent injection of malicious data into session variables. 3. Monitor and audit web server logs for unusual or suspicious requests targeting sql.php parameters that could indicate exploitation attempts. 4. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to manipulate session variables or inject SQL queries. 5. Enforce secure session management practices, including regenerating session IDs after login and setting appropriate cookie flags (HttpOnly, Secure, SameSite). 6. Apply patches or updates from phpPgAdmin maintainers as soon as they become available. 7. Consider alternative PostgreSQL administration tools with stronger security postures if immediate patching is not feasible. 8. Educate administrators about the risks of exposing phpPgAdmin publicly and encourage the use of multi-factor authentication where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f31a85f37bd1ac456251b

Added to database: 11/20/2025, 3:20:08 PM

Last enriched: 11/20/2025, 3:23:50 PM

Last updated: 11/20/2025, 5:58:36 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats