Metrics
Affected Vendors & Products
Wed, 25 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 25 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Feb 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pimcore
Pimcore pimcore |
|
| Vendors & Products |
Pimcore
Pimcore pimcore |
Tue, 24 Feb 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pimcore is an Open Source Data & Experience Management Platform. In versions up to and including 11.5.14.1 and 12.3.2, the filter query parameter in the dependency listing endpoints is JSON-decoded and the value field is concatenated directly into RLIKE clauses without sanitization or parameterized queries. Exploiting this issue requires admin authentication. An attacker with admin panel access can extract the full database including password hashes of other admin users. Version 12.3.3 contains a patch. | |
| Title | Pimcore vulnerable to SQL injection via unsanitized filter value in Dependency Dao RLIKE clause | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-24T18:58:07.625Z
Reserved: 2026-02-19T17:25:31.100Z
Link: CVE-2026-27461
Updated: 2026-02-24T18:56:41.952Z
Status : Analyzed
Published: 2026-02-24T04:15:58.787
Modified: 2026-02-25T19:11:17.440
Link: CVE-2026-27461
No data.