GHSA-QVR7-7G55-69XJ
Vulnerability from github – Published: 2026-01-14 21:15 – Updated: 2026-01-21 16:52Summary
An incomplete SQL injection patch in the Admin Search Find API allows an authenticated attacker to perform blind SQL injection. Although CVE-2023-30848 attempted to mitigate SQL injection by removing SQL comments (--) and catching syntax errors, the fix is insufficient. Attackers can still inject SQL payloads that do not rely on comments and infer database information via blind techniques. This vulnerability affects the admin interface and can lead to database information disclosure.
Details
The vulnerability exists in the Admin Search Find API endpoint:
/admin/search/search/find
In CVE-2023-30848, the following patch was applied:
- SQL comments are removed by replacing
-- - SQL syntax errors are caught and replaced with a generic exception
Relevant commit:
https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3
Key changes include:
// remove sql comments
$fields = str_replace('--', '', $fields);
try {
$hits = $searcherList->load();
} catch (SyntaxErrorException $syntaxErrorException) {
throw new \InvalidArgumentException('Check your arguments.');
}
However, this mitigation is incomplete for the following reasons:
1. Only -- is filtered
SQL injection does not require SQL comments. Payloads using boolean conditions, SQL functions, or time-based expressions remain effective.
2. Exception handling only suppresses error output
While syntax errors no longer produce detailed error messages, the underlying SQL query is still executed. This allows attackers to perform blind SQL injection.
3. User-controlled input is still used in SQL query construction
The fields[] parameter is attacker-controlled and can be abused to inject SQL expressions into the generated query.
As a result, attackers can craft payloads that do not trigger syntax errors and still influence SQL execution.
PoC
The following request demonstrates a blind SQL injection via the fields[] parameter.
Boolean-based Blind Injection
GET /admin/search/search/find?query=2&
fields[]=field1 AND (SELECT CASE WHEN (1=1) THEN 1 ELSE 0 END)=1~field2&
filter=[{"property":"value"}]&
class=classname
Time-based Blind Injection
GET /admin/search/search/find?query=2&
fields[]=field1 AND IF(1=1,SLEEP(5),0)~field2&
filter=[{"property":"value"}]&
class=classname
Observed behavior:
-
When the condition is true, the response is delayed (e.g., ~5 seconds)
-
When the condition is false, the response is returned immediately
This confirms that injected SQL expressions are executed successfully.
Impact
This is a Blind SQL Injection vulnerability.
-
Affected users: Systems exposing the Admin Search Find API to authenticated users
-
Attack requirements: Authenticated access to the admin interface
-
Potential impact:
-
Database schema enumeration
-
Extraction of sensitive data via blind SQL injection
-
Potential full database compromise depending on database privileges
This issue demonstrates that the fix for CVE-2023-30848 is incomplete.
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "pimcore/pimcore"
},
"ranges": [
{
"events": [
{
"introduced": "12.0.0-RC1"
},
{
"fixed": "12.3.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 11.5.13"
},
"package": {
"ecosystem": "Packagist",
"name": "pimcore/pimcore"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "11.5.14"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-23492"
],
"database_specific": {
"cwe_ids": [
"CWE-89"
],
"github_reviewed": true,
"github_reviewed_at": "2026-01-14T21:15:43Z",
"nvd_published_at": "2026-01-14T19:16:48Z",
"severity": "HIGH"
},
"details": "### Summary\nAn **incomplete SQL injection patch** in the Admin Search Find API allows an authenticated attacker to perform **blind SQL injection**.\nAlthough CVE-2023-30848 attempted to mitigate SQL injection by removing SQL comments (--) and catching syntax errors, the fix is insufficient. Attackers can still inject SQL payloads that do not rely on comments and infer database information via blind techniques. This vulnerability affects the admin interface and can lead to **database information disclosure**.\n\n### Details\nThe vulnerability exists in the Admin Search Find API endpoint:\n```\n/admin/search/search/find\n```\nIn CVE-2023-30848, the following patch was applied:\n\n- SQL comments are removed by replacing `--`\n- SQL syntax errors are caught and replaced with a generic exception\n\nRelevant commit: \nhttps://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3\n\nKey changes include:\n```\n// remove sql comments\n$fields = str_replace(\u0027--\u0027, \u0027\u0027, $fields);\n\ntry {\n $hits = $searcherList-\u003eload();\n} catch (SyntaxErrorException $syntaxErrorException) {\n throw new \\InvalidArgumentException(\u0027Check your arguments.\u0027);\n}\n```\nHowever, this mitigation is incomplete for the following reasons:\n\n**1. Only `--` is filtered**\n\nSQL injection does not require SQL comments. Payloads using boolean conditions, SQL functions, or time-based expressions remain effective.\n\n**2. Exception handling only suppresses error output**\n\nWhile syntax errors no longer produce detailed error messages, the underlying SQL query is still executed. This allows attackers to perform blind SQL injection.\n\n**3. User-controlled input is still used in SQL query construction**\nThe `fields[]` parameter is attacker-controlled and can be abused to inject SQL expressions into the generated query.\n\nAs a result, attackers can craft payloads that do not trigger syntax errors and still influence SQL execution.\n### PoC\nThe following request demonstrates a **blind SQL injection** via the `fields[]` parameter.\n\n**Boolean-based Blind Injection**\n```\nGET /admin/search/search/find?query=2\u0026\nfields[]=field1 AND (SELECT CASE WHEN (1=1) THEN 1 ELSE 0 END)=1~field2\u0026\nfilter=[{\"property\":\"value\"}]\u0026\nclass=classname\n```\n**Time-based Blind Injection**\n```\nGET /admin/search/search/find?query=2\u0026\nfields[]=field1 AND IF(1=1,SLEEP(5),0)~field2\u0026\nfilter=[{\"property\":\"value\"}]\u0026\nclass=classname\n```\n**Observed behavior:**\n\n- When the condition is true, the response is delayed (e.g., ~5 seconds)\n\n- When the condition is false, the response is returned immediately\n\nThis confirms that injected SQL expressions are executed successfully.\n### Impact\nThis is a **Blind SQL Injection vulnerability.**\n\n- Affected users: Systems exposing the Admin Search Find API to authenticated users\n\n- Attack requirements: Authenticated access to the admin interface\n\n- Potential impact:\n\n - Database schema enumeration\n \n - Extraction of sensitive data via blind SQL injection\n \n - Potential full database compromise depending on database privileges\n\nThis issue demonstrates that the fix for CVE-2023-30848 is **incomplete.**",
"id": "GHSA-qvr7-7g55-69xj",
"modified": "2026-01-21T16:52:07Z",
"published": "2026-01-14T21:15:43Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-qvr7-7g55-69xj"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23492"
},
{
"type": "WEB",
"url": "https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-6mhm-gcpf-5gr8"
},
{
"type": "PACKAGE",
"url": "https://github.com/pimcore/pimcore"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Pimcore Has an Incomplete Patch for CVE-2023-30848"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.