CVE-2025-60798: phppgadmin contains a SQL injection vulnerability
(updated )
phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in display.php at line 396. The application passes user-controlled input from $_REQUEST[‘query’] directly to the browseQuery function without proper sanitization. An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands through malicious query manipulation, potentially leading to complete database compromise.
References
- github.com/advisories/GHSA-g6xh-wrpf-v6j6
- github.com/phppgadmin/phppgadmin
- github.com/phppgadmin/phppgadmin/blob/master/display.php
- github.com/pr0wl1ng/security-advisories/blob/main/CVE-2025-60797.md
- github.com/pr0wl1ng/security-advisories/blob/main/CVE-2025-60798.md
- nvd.nist.gov/vuln/detail/CVE-2025-60798
Code Behaviors & Features
Detect and mitigate CVE-2025-60798 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →