← Back to CVEs
CVE-2021-21311
HIGHCISA KEV7.2
Description
Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
CVE Details
CVSS v3.1 Score7.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/11/2021
Last Modified10/24/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorAdminer
ProductAdminer
Vulnerability NameAdminer Server-Side Request Forgery Vulnerability
KEV Date Added2025-09-29
Remediation Due Date2025-10-20
Ransomware UseUnknown
Affected Products
adminer:adminerdebian:debian_linux
Weaknesses (CWE)
CWE-918
References
https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351(security-advisories@github.com)
https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf(security-advisories@github.com)
https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6(security-advisories@github.com)
https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html(security-advisories@github.com)
https://packagist.org/packages/vrana/adminer(security-advisories@github.com)
https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
https://packagist.org/packages/vrana/adminer(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-21311(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.