Improper escaping of a query parameter may allow an attacker to execute arbitrary SQL statements when the code using ADOdb connects to a PostgreSQL database and calls pginsertid() with user-supplied data.
Note that the indicated Severity corresponds to a worst-case usage scenario.
PostgreSQL drivers (postgres64, postgres7, postgres8, postgres9).
Vulnerability is fixed in ADOdb 5.22.9 (11107d6d6e5160b62e05dff8a3a2678cf0e3a426).
Only pass controlled data to pginsertid() method's $fieldname parameter, or escape it with pgescapeidentifier() first.
Thanks to Marco Nappi (@mrcnpp) for reporting this vulnerability.
{ "nvd_published_at": "2025-05-01T18:15:57Z", "cwe_ids": [ "CWE-89" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2025-05-01T13:59:51Z" }