SQL Injection Affecting admidio/admidio package, versions <5.0.7


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-ADMIDIOADMIDIO-15679917
  • published18 Mar 2026
  • disclosed16 Mar 2026
  • creditrestriction

Introduced: 16 Mar 2026

CVE-2026-32813  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade admidio/admidio to version 5.0.7 or higher.

Overview

admidio/admidio is a free open source user management system for websites of organizations and groups.

Affected versions of this package are vulnerable to SQL Injection in the processing of user-supplied values for list configuration fields such as lsc_special_field, lsc_sort, and lsc_filter. An attacker can execute arbitrary SQL commands by injecting malicious input into these fields, which are later interpolated directly into SQL queries without proper sanitization or parameterization. This can lead to unauthorized access, modification, or deletion of database contents, and potentially full compromise of the underlying database. This is only exploitable if an authenticated user with list edit permissions submits crafted input, as all logged-in users have this permission by default and the CSRF token is available within the same session.

References

CVSS Base Scores

version 4.0
version 3.1