First published: Tue Mar 11 2025(Updated: )
### Summary Authenticated users can craft a filter string used to cause a SQL injection. ### Details _Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer._ This code does not look to sanitize inputs: https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Extension/RelationFilterConditionParser.php#L29-L47 c.f. with https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Multiselect.php#L332-L347 ### PoC _Complete instructions, including specific configuration details, to reproduce the vulnerability._ ### Impact _What kind of vulnerability is it? Who is impacted?_
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pimcore/pimcore | <11.5.4 | 11.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-qjpx-5m2p-5pgh is classified as a high-risk SQL injection vulnerability.
To fix GHSA-qjpx-5m2p-5pgh, upgrade to version 11.5.4 or later of the Pimcore package.
Authenticated users of versions prior to 11.5.4 of Pimcore are affected by GHSA-qjpx-5m2p-5pgh.
GHSA-qjpx-5m2p-5pgh is a SQL injection vulnerability that allows authenticated users to craft malicious filter strings.
GHSA-qjpx-5m2p-5pgh affects the Pimcore package specifically versions before 11.5.4.