Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4189: SQL Injection in phpipam

0
Medium
VulnerabilityCVE-2026-4189cvecve-2026-4189
Published: Sun Mar 15 2026 (03/15/2026, 19:32:12 UTC)
Source: CVE Database V5
Product: phpipam

Description

CVE-2026-4189 is a medium severity SQL injection vulnerability affecting phpipam versions 1. 7. 0 through 1. 7. 4. The flaw exists in the Section Handler component within the file app/admin/sections/edit-result. php, specifically related to the manipulation of the subnetOrdering argument. An attacker with high privileges can remotely exploit this vulnerability without user interaction to execute arbitrary SQL commands, potentially compromising data confidentiality, integrity, and availability. Although the vendor was notified, no patch or response has been provided yet, and no known exploits are currently observed in the wild. Organizations using phpipam for IP address management should prioritize risk assessment and consider mitigation strategies to prevent exploitation.

AI-Powered Analysis

AILast updated: 03/15/2026, 19:50:38 UTC

Technical Analysis

CVE-2026-4189 identifies a SQL injection vulnerability in phpipam, an open-source IP address management application, affecting versions 1.7.0 through 1.7.4. The vulnerability resides in the Section Handler component, specifically in the app/admin/sections/edit-result.php file, where the subnetOrdering parameter is improperly sanitized. This lack of input validation allows an attacker to inject malicious SQL code remotely. The attack vector requires the attacker to have high privileges (as indicated by the CVSS vector requiring PR:H), but does not require user interaction. Exploitation could lead to unauthorized data access, modification, or deletion within the phpipam database, impacting the confidentiality, integrity, and availability of IP address management data. The vulnerability has been publicly disclosed, but the vendor has not issued a patch or official response. No known exploits are currently reported in the wild, but the availability of a public exploit increases the risk of future attacks. The CVSS 4.0 base score of 5.1 reflects a medium severity, balancing the ease of remote exploitation with the requirement for high privileges and limited scope of impact.

Potential Impact

The exploitation of CVE-2026-4189 could have significant consequences for organizations relying on phpipam for IP address management. Successful SQL injection attacks may allow attackers to extract sensitive network configuration data, alter IP address assignments, or disrupt network management operations. This could lead to network outages, misconfigurations, or unauthorized lateral movement within an organization's infrastructure. Since phpipam is often integrated into broader network management and monitoring systems, compromise of its database integrity could cascade into wider operational impacts. The requirement for high privileges limits the attack surface to insiders or attackers who have already gained elevated access, but the remote exploitability means that once such access is obtained, the attacker can leverage this vulnerability without further user interaction. The absence of a vendor patch increases the window of exposure, and public availability of exploit code raises the likelihood of exploitation attempts.

Mitigation Recommendations

Organizations should immediately audit their phpipam installations to determine if affected versions (1.7.0 to 1.7.4) are in use. Given the lack of an official patch, mitigation should focus on minimizing exposure: restrict access to the phpipam administrative interface to trusted networks and users only, enforce strong authentication and role-based access controls to limit high privilege accounts, and monitor logs for suspicious SQL activity or unexpected database errors. Employing web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the subnetOrdering parameter can provide an additional layer of defense. Where feasible, consider isolating phpipam databases and backing up critical data regularly to enable recovery from potential tampering. Organizations should also engage with the phpipam community or maintainers to track any forthcoming patches or updates addressing this vulnerability. Finally, conducting regular security assessments and penetration tests focusing on SQL injection vectors can help identify and remediate similar weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-14T22:31:15.530Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b70a219d4df451835b4b62

Added to database: 3/15/2026, 7:36:01 PM

Last enriched: 3/15/2026, 7:50:38 PM

Last updated: 3/15/2026, 9:50:28 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses