PT-2026-21658 · Pimcore · Pimcore
Q1Uf3Ng
·
Published
2026-02-24
·
Updated
2026-02-25
·
CVE-2026-27461
CVSS v4.0
6.9
Medium
| AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
Pimcore versions up to and including 11.5.14.1
Pimcore versions up to and including 12.3.2
Description
Pimcore is an Open Source Data & Experience Management Platform. The
filter query parameter in the dependency listing endpoints is processed without proper sanitization, allowing for potential database extraction. Specifically, the parameter is JSON-decoded and its value is directly incorporated into RLIKE clauses without adequate security measures. Successful exploitation requires administrative authentication. An attacker with admin panel access could potentially extract the entire database, including password hashes of other administrative users. The affected endpoints involve dependency listing functionality. The vulnerable parameter is filter query.Recommendations
Update to Pimcore version 12.3.3 or later.
Exploit
Fix
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Pimcore