PT-2026-21658 · Pimcore · Pimcore

Q1Uf3Ng

·

Published

2026-02-24

·

Updated

2026-02-25

·

CVE-2026-27461

CVSS v4.0

6.9

Medium

AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions Pimcore versions up to and including 11.5.14.1 Pimcore versions up to and including 12.3.2
Description Pimcore is an Open Source Data & Experience Management Platform. The filter query parameter in the dependency listing endpoints is processed without proper sanitization, allowing for potential database extraction. Specifically, the parameter is JSON-decoded and its value is directly incorporated into RLIKE clauses without adequate security measures. Successful exploitation requires administrative authentication. An attacker with admin panel access could potentially extract the entire database, including password hashes of other administrative users. The affected endpoints involve dependency listing functionality. The vulnerable parameter is filter query.
Recommendations Update to Pimcore version 12.3.3 or later.

Exploit

Fix

SQL injection

Weakness Enumeration

Related Identifiers

CVE-2026-27461
GHSA-VXG3-V4P6-F3FP

Affected Products

Pimcore