Source: libphp-adodb
Version: 5.22.8-0.1
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://github.com/ADOdb/ADOdb/issues/1070
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for libphp-adodb.

CVE-2025-46337[0]:
| ADOdb is a PHP database class library that provides abstractions for
| performing queries and managing databases. Prior to version 5.22.9,
| improper escaping of a query parameter may allow an attacker to
| execute arbitrary SQL statements when the code using ADOdb connects
| to a PostgreSQL database and calls pg_insert_id() with user-supplied
| data. This issue has been patched in version 5.22.9.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-46337
    https://www.cve.org/CVERecord?id=CVE-2025-46337
[1] https://github.com/ADOdb/ADOdb/issues/1070
[2] https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
[3] 
https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to