CVE-2025-60799Improper Access Control in Project Phppgadmin

Severity
6.1MEDIUMNVD
EPSS
0.0%
top 99.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 20

Description

phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. Attackers can exploit this to store arbitrary SQL queries in $_SESSION['sqlquery'] by manipulating these parameters, potentially leading to session poisoning, stored cross-site scriptin

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages3 packages

🔴Vulnerability Details

3
GHSA
phppgadmin contains an incorrect access control vulnerability2025-11-20
OSV
phppgadmin contains an incorrect access control vulnerability2025-11-20
OSV
CVE-2025-60799: phpPgAdmin 72025-11-20

📋Vendor Advisories

1
Debian
CVE-2025-60799: phppgadmin - phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability...2025