SQL Injection Affecting z-push/z-push-dev package, versions <2.7.6


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-ZPUSHZPUSHDEV-10908180
  • published28 Jul 2025
  • disclosed9 Jul 2025
  • creditXBOW

Introduced: 9 Jul 2025

NewCVE-2025-8264  (opens in a new tab)
CWE-89  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade z-push/z-push-dev to version 2.7.6 or higher.

Overview

z-push/z-push-dev is an open-source application to synchronize ActiveSync compatible devices

Affected versions of this package are vulnerable to SQL Injection due to unparameterized queries in the IMAP backend. An attacker can inject malicious commands by manipulating the username field in basic authentication. This allows the attacker to access and potentially modify or delete sensitive data from a linked third-party database.

Note: This vulnerability affects Z-Push installations that utilize the IMAP backend and have the IMAP_FROM_SQL_QUERY option configured.

Mitigation

Change configuration to use the default or LDAP in backend/imap/config.php

define('IMAP_DEFAULTFROM', '');

or

define('IMAP_DEFAULTFROM', 'ldap');

CVSS Base Scores

version 4.0
version 3.1