Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. pimcore/pimcore
  4. ›
  5. CVE-2026-23492

CVE-2026-23492: Pimcore Has an Incomplete Patch for CVE-2023-30848

January 14, 2026 (updated January 21, 2026)

An incomplete SQL injection patch in the Admin Search Find API allows an authenticated attacker to perform blind SQL injection. Although CVE-2023-30848 attempted to mitigate SQL injection by removing SQL comments (–) and catching syntax errors, the fix is insufficient. Attackers can still inject SQL payloads that do not rely on comments and infer database information via blind techniques. This vulnerability affects the admin interface and can lead to database information disclosure.

References

  • github.com/advisories/GHSA-6mhm-gcpf-5gr8
  • github.com/advisories/GHSA-qvr7-7g55-69xj
  • github.com/pimcore/pimcore
  • github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3
  • github.com/pimcore/pimcore/security/advisories/GHSA-qvr7-7g55-69xj
  • nvd.nist.gov/vuln/detail/CVE-2026-23492

Code Behaviors & Features

Detect and mitigate CVE-2026-23492 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 11.5.14, all versions starting from 12.0.0-RC1 before 12.3.1

Fixed versions

  • 12.3.1
  • 11.5.14

Solution

Upgrade to versions 11.5.14, 12.3.1 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

packagist/pimcore/pimcore/CVE-2026-23492.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 17 Feb 2026 12:19:25 +0000.