← Back to CVEs
CVE-2026-25892
HIGH7.5
Description
Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/9/2026
Last Modified2/20/2026
Sourcenvd
Honeypot Sightings0
Affected Products
adminer:adminer
Weaknesses (CWE)
CWE-20
References
https://github.com/vrana/adminer/commit/21d3a3150388677b18647d68aec93b7850e457d3(security-advisories@github.com)
https://github.com/vrana/adminer/releases/tag/v5.4.2(security-advisories@github.com)
https://github.com/vrana/adminer/security/advisories/GHSA-q4f2-39gr-45jh(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.