CVE-2025-60796

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-60796
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-60796.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-60796
Aliases
Downstream
Published
2025-11-20T15:17:38.100Z
Modified
2025-11-27T03:17:45.684888Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities across various components. User-supplied input from $_REQUEST parameters is reflected in HTML output without proper encoding or sanitization in multiple locations including sequences.php, indexes.php, admin.php, and other unspecified files. An attacker can exploit these vulnerabilities to execute arbitrary JavaScript in victims' browsers, potentially leading to session hijacking, credential theft, or other malicious actions.

References

Affected packages

Git / github.com/phppgadmin/phppgadmin

Affected ranges

Type
GIT
Repo
https://github.com/phppgadmin/phppgadmin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

REL_0-5-0
REL_0-6-0
REL_0-6-5
REL_3-0-0-DEV-1
REL_3-0-0-DEV-2
REL_3-0-0-DEV-3
REL_3-0-0-DEV-4
REL_3-0-BETA-1
REL_3-0-RC-1
REL_3-0-RC-2
REL_3-1-BETA-1
REL_3-1-RC-1
REL_4-1-BETA-1
REL_4-2-BETA-1
REL_4-2-BETA-2
REL_5-0-BETA-1
REL_5-0-BETA-2
REL_5-1-0
REL_5-6-0
REL_7-12-1
REL_7-13-0