Source: libphp-adodb
Version: 5.22.9-0.1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/ADOdb/ADOdb/issues/1083
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libphp-adodb.

CVE-2025-54119[0]:
| ADOdb is a PHP database class library that provides abstractions for
| performing queries and managing databases. In versions 5.22.9 and
| below, improper escaping of a query parameter may allow an attacker
| to execute arbitrary SQL statements when the code using ADOdb
| connects to a sqlite3 database and calls the metaColumns(),
| metaForeignKeys() or metaIndexes() methods with a crafted table
| name. This is fixed in version 5.22.10. To workaround this issue,
| only pass controlled data to metaColumns(), metaForeignKeys() and
| metaIndexes() method's $table parameter.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-54119
    https://www.cve.org/CVERecord?id=CVE-2025-54119
[1] https://github.com/ADOdb/ADOdb/issues/1083
[2] https://github.com/ADOdb/ADOdb/security/advisories/GHSA-vf2r-cxg9-p7rf
[3] 
https://github.com/ADOdb/ADOdb/commit/5b8bd52cdcffefb4ecded1b399c98cfa516afe03

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to