CVE-2025-60799
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-20

Last updated on: 2025-11-25

Assigner: MITRE

Description
phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. Attackers can exploit this to store arbitrary SQL queries in $_SESSION['sqlquery'] by manipulating these parameters, potentially leading to session poisoning, stored cross-site scripting, or unauthorized access to sensitive session data.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-20
Last Modified
2025-11-25
Generated
2026-05-07
AI Q&A
2025-11-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
phppgadmin_project phppgadmin to 7.13.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in phpPgAdmin 7.13.0 and earlier involves incorrect access control in the sql.php file, where user-controlled parameters ('subject', 'server', 'database', 'queryid') are accepted without proper validation. This allows attackers to manipulate session variables, specifically to store arbitrary SQL queries in the session variable $_SESSION['sqlquery'], which can lead to session poisoning, stored cross-site scripting, or unauthorized access to sensitive session data.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers to poison your session data, execute stored cross-site scripting attacks, or gain unauthorized access to sensitive session information. This can compromise the security and integrity of your application and potentially expose sensitive data or allow further attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart