{"id":"CVE-2025-60797","details":"phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data-\u003econn-\u003eExecute($_REQUEST['query']). An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to complete database compromise, data theft, or privilege escalation.","aliases":["GHSA-927w-vq5c-8gc3"],"modified":"2026-03-13T03:40:11.038728Z","published":"2025-11-20T15:17:38.250Z","references":[{"type":"WEB","url":"https://github.com/phppgadmin/phppgadmin/blob/master/dataexport.php#L118"},{"type":"ADVISORY","url":"https://github.com/pr0wl1ng/security-advisories/blob/main/CVE-2025-60797.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phppgadmin/phppgadmin","events":[{"introduced":"0"},{"last_affected":"13f3f821e6891ae2093e6b66ce190353624886ce"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.13.0"}]}}],"versions":["REL_0-5-0","REL_0-6-0","REL_0-6-5","REL_3-0-0-DEV-1","REL_3-0-0-DEV-2","REL_3-0-0-DEV-3","REL_3-0-0-DEV-4","REL_3-0-BETA-1","REL_3-0-RC-1","REL_3-0-RC-2","REL_3-1-BETA-1","REL_3-1-RC-1","REL_4-1-BETA-1","REL_4-2-BETA-1","REL_4-2-BETA-2","REL_5-0-BETA-1","REL_5-0-BETA-2","REL_5-1-0","REL_5-6-0","REL_7-12-1","REL_7-13-0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-60797.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}