Source: libphp-adodb Version: 5.22.9-0.1 Severity: grave Tags: security upstream Forwarded: https://github.com/ADOdb/ADOdb/issues/1083 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for libphp-adodb. CVE-2025-54119[0]: | ADOdb is a PHP database class library that provides abstractions for | performing queries and managing databases. In versions 5.22.9 and | below, improper escaping of a query parameter may allow an attacker | to execute arbitrary SQL statements when the code using ADOdb | connects to a sqlite3 database and calls the metaColumns(), | metaForeignKeys() or metaIndexes() methods with a crafted table | name. This is fixed in version 5.22.10. To workaround this issue, | only pass controlled data to metaColumns(), metaForeignKeys() and | metaIndexes() method's $table parameter. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-54119 https://www.cve.org/CVERecord?id=CVE-2025-54119 [1] https://github.com/ADOdb/ADOdb/issues/1083 [2] https://github.com/ADOdb/ADOdb/security/advisories/GHSA-vf2r-cxg9-p7rf [3] https://github.com/ADOdb/ADOdb/commit/5b8bd52cdcffefb4ecded1b399c98cfa516afe03 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

