Description
In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: None
Affected Packages5 packages
▶Debianphp7.4< 7.4.33-1+deb11u3 ▶Ubuntuphp7.0< 7.0.33-0ubuntu0.16.04.16+esm5 🔴Vulnerability Details
4GHSAGHSA-4qmr-c42j-3wg2: In PHP versions 8↗2025-02-13 ▶ OSVCVE-2022-31631: In PHP versions 8↗2025-02-12 ▶ CVEListPDO::quote() may return unquoted string↗2025-02-12 ▶ OSVphp7.0 vulnerabilities↗2023-03-02 ▶ 📋Vendor Advisories
4UbuntuPHP vulnerabilities↗2023-03-02 ▶ UbuntuPHP vulnerability↗2023-01-23 ▶ Red Hatphp: PDO:: quote() may return unquoted string due to an integer overflow↗2023-01-05 ▶ DebianCVE-2022-31631: php7.4 - In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 whe...↗2022 ▶