Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-wyd8-1reg-23h2
Vulnerability ID VCID-wyd8-1reg-23h2
Aliases CVE-2025-46337
GHSA-8x27-jwjr-8545
Summary SQL injection in ADOdb PostgreSQL driver pg_insert_id() method Improper escaping of a query parameter may allow an attacker to execute arbitrary SQL statements when the code using ADOdb connects to a PostgreSQL database and calls pg_insert_id() with user-supplied data. Note that the indicated Severity corresponds to a worst-case usage scenario. ### Impact PostgreSQL drivers (postgres64, postgres7, postgres8, postgres9). ### Patches Vulnerability is fixed in ADOdb 5.22.9 (11107d6d6e5160b62e05dff8a3a2678cf0e3a426). ### Workarounds Only pass controlled data to pg_insert_id() method's $fieldname parameter, or escape it with pg_escape_identifier() first. ### References - Issue https://github.com/ADOdb/ADOdb/issues/1070 - [Blog post](https://xaliom.blogspot.com/2025/05/from-sast-to-cve-2025-46337.html) by Marco Nappi ### Credits Thanks to Marco Nappi (@mrcnpp) for reporting this vulnerability.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00522 https://api.first.org/data/v1/epss?cve=CVE-2025-46337
epss 0.00522 https://api.first.org/data/v1/epss?cve=CVE-2025-46337
epss 0.00522 https://api.first.org/data/v1/epss?cve=CVE-2025-46337
epss 0.00522 https://api.first.org/data/v1/epss?cve=CVE-2025-46337
epss 0.00522 https://api.first.org/data/v1/epss?cve=CVE-2025-46337
epss 0.00522 https://api.first.org/data/v1/epss?cve=CVE-2025-46337
epss 0.00522 https://api.first.org/data/v1/epss?cve=CVE-2025-46337
epss 0.00522 https://api.first.org/data/v1/epss?cve=CVE-2025-46337
cvssv3.1 10.0 https://github.com/ADOdb/ADOdb
generic_textual CRITICAL https://github.com/ADOdb/ADOdb
cvssv3.1 10 https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426
cvssv3.1 10.0 https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426
generic_textual CRITICAL https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426
ssvc Track https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426
cvssv3.1 10 https://github.com/ADOdb/ADOdb/issues/1070
cvssv3.1 10.0 https://github.com/ADOdb/ADOdb/issues/1070
generic_textual CRITICAL https://github.com/ADOdb/ADOdb/issues/1070
ssvc Track https://github.com/ADOdb/ADOdb/issues/1070
cvssv3.1 10 https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
cvssv3.1 10.0 https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
cvssv3.1_qr CRITICAL https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
generic_textual CRITICAL https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
ssvc Track https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-8x27-jwjr-8545
cvssv3.1 10.0 https://lists.debian.org/debian-lts-announce/2025/05/msg00029.html
generic_textual CRITICAL https://lists.debian.org/debian-lts-announce/2025/05/msg00029.html
cvssv3.1 10.0 https://nvd.nist.gov/vuln/detail/CVE-2025-46337
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2025-46337
cvssv3.1 10.0 https://xaliom.blogspot.com/2025/05/from-sast-to-cve-2025-46337.html
generic_textual CRITICAL https://xaliom.blogspot.com/2025/05/from-sast-to-cve-2025-46337.html
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://github.com/ADOdb/ADOdb
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T17:57:27Z/ Found at https://github.com/ADOdb/ADOdb/commit/11107d6d6e5160b62e05dff8a3a2678cf0e3a426
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://github.com/ADOdb/ADOdb/issues/1070
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://github.com/ADOdb/ADOdb/issues/1070
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T17:57:27Z/ Found at https://github.com/ADOdb/ADOdb/issues/1070
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T17:57:27Z/ Found at https://github.com/ADOdb/ADOdb/security/advisories/GHSA-8x27-jwjr-8545
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://lists.debian.org/debian-lts-announce/2025/05/msg00029.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2025-46337
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L Found at https://xaliom.blogspot.com/2025/05/from-sast-to-cve-2025-46337.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.66834
EPSS Score 0.00522
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:57:01.400272+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-8x27-jwjr-8545/GHSA-8x27-jwjr-8545.json 38.0.0