SQL Injection Affecting adodb/adodb-php package, versions <5.22.9


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (14th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-ADODBADODBPHP-10006766
  • published4 May 2025
  • disclosed1 May 2025
  • creditMarco Nappi

Introduced: 1 May 2025

NewCVE-2025-46337  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade adodb/adodb-php to version 5.22.9 or higher.

Overview

Affected versions of this package are vulnerable to SQL Injection due to improper escaping of a query parameter in the postgres64, postgres7, postgres8, and postgres9 drivers. An attacker can execute arbitrary SQL statements by injecting malicious SQL code into the pg_insert_id method.

Workaround

Avoid passing untrusted or user-supplied data directly to the $fieldname parameter of the pg_insert_id() method. If you must use such data, first process it with the pg_escape_identifier() function to prevent SQL injection.

CVSS Base Scores

version 4.0
version 3.1