Home

Description

Admidio is an open-source user management solution. Versions 5.0.6 and below are vulnerable to arbitrary SQL Injection through the MyList configuration feature. The MyList configuration feature lets authenticated users define custom list column layouts, storing user-supplied column names, sort directions, and filter conditions in the adm_list_columns table via prepared statements. However, these stored values are later read back and interpolated directly into dynamically constructed SQL queries without sanitization or parameterization, creating a classic second-order SQL injection vulnerability (safe write, unsafe read). An attacker can exploit this to inject arbitrary SQL, potentially reading, modifying, or deleting any data in the database and achieving full database compromise. This issue has been fixed in version 5.0.7.

PUBLISHED Reserved 2026-03-16 | Published 2026-03-20 | Updated 2026-03-20 | Assigner GitHub_M




HIGH: 8.0CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 5.0.7
affected

References

github.com/...dmidio/security/advisories/GHSA-3x67-4c2c-w45m exploit

github.com/...dmidio/security/advisories/GHSA-3x67-4c2c-w45m

github.com/...ommit/3473bf5a7aa1bfc5043e73979719396276f4189f

cve.org (CVE-2026-32813)

nvd.nist.gov (CVE-2026-32813)

Download JSON