CVE-2025-60799: n/a
phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. Attackers can exploit this to store arbitrary SQL queries in $_SESSION['sqlquery'] by manipulating these parameters, potentially leading to session poisoning, stored cross-site scripting, or unauthorized access to sensitive session data.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-60799 affects phpPgAdmin, a popular web-based administration tool for PostgreSQL databases, specifically versions 7.13.0 and earlier. The issue resides in the sql.php script, between lines 68 and 76, where the application accepts user-supplied parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. This improper handling allows attackers to manipulate session variables, particularly $_SESSION['sqlquery'], by injecting arbitrary SQL queries. The core weakness is an incorrect access control (CWE-284), which results in session poisoning—where an attacker can overwrite or inject malicious data into a user's session context. This can lead to stored cross-site scripting (XSS) attacks if the injected SQL queries or session data are rendered in the user interface without sanitization. Additionally, unauthorized access to sensitive session data may occur, potentially exposing confidential information or enabling further exploitation. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality and integrity with a CVSS v3.1 base score of 6.1. No patches or known exploits are currently available, highlighting the need for proactive mitigation. The vulnerability's scope is 'changed' (S:C), indicating that exploitation affects resources beyond the vulnerable component, such as session data accessible across the application.
Potential Impact
For European organizations, the exploitation of this vulnerability could lead to unauthorized access to sensitive database session data, potentially exposing confidential business or customer information. Session poisoning and stored XSS could allow attackers to hijack user sessions, execute arbitrary scripts in the context of authenticated users, or manipulate database queries, which may result in data integrity issues or unauthorized data retrieval. Organizations relying on phpPgAdmin for PostgreSQL management, especially in sectors handling sensitive data such as finance, healthcare, or government, face increased risks of data breaches and compliance violations under GDPR. The medium severity score reflects a moderate but tangible risk, particularly as exploitation does not require authentication but does need user interaction, such as clicking a crafted link. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. Disruption to database administration workflows and potential reputational damage are additional concerns.
Mitigation Recommendations
European organizations should immediately review their phpPgAdmin deployments and restrict access to trusted administrators only, ideally limiting access via VPN or internal networks. Implement web application firewalls (WAFs) with rules to detect and block suspicious parameter manipulation targeting sql.php. Monitor session variables and logs for unusual activity indicative of session poisoning or injection attempts. Until an official patch is released, consider disabling or restricting the vulnerable sql.php functionality if feasible. Educate users to avoid clicking untrusted links that could trigger malicious parameter injection. Employ Content Security Policy (CSP) headers to mitigate the impact of stored XSS attacks. Regularly update phpPgAdmin to the latest versions once patches become available. Additionally, conduct security audits of session management and parameter validation mechanisms within phpPgAdmin and related tools. For PostgreSQL environments, ensure that database access controls and logging are robust to detect and respond to suspicious queries or access patterns.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-60799: n/a
Description
phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. Attackers can exploit this to store arbitrary SQL queries in $_SESSION['sqlquery'] by manipulating these parameters, potentially leading to session poisoning, stored cross-site scripting, or unauthorized access to sensitive session data.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-60799 affects phpPgAdmin, a popular web-based administration tool for PostgreSQL databases, specifically versions 7.13.0 and earlier. The issue resides in the sql.php script, between lines 68 and 76, where the application accepts user-supplied parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. This improper handling allows attackers to manipulate session variables, particularly $_SESSION['sqlquery'], by injecting arbitrary SQL queries. The core weakness is an incorrect access control (CWE-284), which results in session poisoning—where an attacker can overwrite or inject malicious data into a user's session context. This can lead to stored cross-site scripting (XSS) attacks if the injected SQL queries or session data are rendered in the user interface without sanitization. Additionally, unauthorized access to sensitive session data may occur, potentially exposing confidential information or enabling further exploitation. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality and integrity with a CVSS v3.1 base score of 6.1. No patches or known exploits are currently available, highlighting the need for proactive mitigation. The vulnerability's scope is 'changed' (S:C), indicating that exploitation affects resources beyond the vulnerable component, such as session data accessible across the application.
Potential Impact
For European organizations, the exploitation of this vulnerability could lead to unauthorized access to sensitive database session data, potentially exposing confidential business or customer information. Session poisoning and stored XSS could allow attackers to hijack user sessions, execute arbitrary scripts in the context of authenticated users, or manipulate database queries, which may result in data integrity issues or unauthorized data retrieval. Organizations relying on phpPgAdmin for PostgreSQL management, especially in sectors handling sensitive data such as finance, healthcare, or government, face increased risks of data breaches and compliance violations under GDPR. The medium severity score reflects a moderate but tangible risk, particularly as exploitation does not require authentication but does need user interaction, such as clicking a crafted link. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. Disruption to database administration workflows and potential reputational damage are additional concerns.
Mitigation Recommendations
European organizations should immediately review their phpPgAdmin deployments and restrict access to trusted administrators only, ideally limiting access via VPN or internal networks. Implement web application firewalls (WAFs) with rules to detect and block suspicious parameter manipulation targeting sql.php. Monitor session variables and logs for unusual activity indicative of session poisoning or injection attempts. Until an official patch is released, consider disabling or restricting the vulnerable sql.php functionality if feasible. Educate users to avoid clicking untrusted links that could trigger malicious parameter injection. Employ Content Security Policy (CSP) headers to mitigate the impact of stored XSS attacks. Regularly update phpPgAdmin to the latest versions once patches become available. Additionally, conduct security audits of session management and parameter validation mechanisms within phpPgAdmin and related tools. For PostgreSQL environments, ensure that database access controls and logging are robust to detect and respond to suspicious queries or access patterns.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691f31a85f37bd1ac456251b
Added to database: 11/20/2025, 3:20:08 PM
Last enriched: 11/27/2025, 3:41:12 PM
Last updated: 1/7/2026, 4:18:03 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.