CVE-2026-27461
📋 TL;DR
This SQL injection vulnerability in Pimcore allows authenticated admin users to extract the entire database, including password hashes of other admin accounts. It affects Pimcore versions up to 11.5.14.1 and 12.3.2. Organizations using these vulnerable versions with admin panel access are at risk.
💻 Affected Systems
- Pimcore
📦 What is this software?
Pimcore by Pimcore
Pimcore by Pimcore
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including sensitive user data, password hashes, and potential lateral movement to other systems.
Likely Case
Extraction of admin password hashes leading to account takeover and privilege escalation within the Pimcore instance.
If Mitigated
Limited impact due to strong access controls, monitoring, and network segmentation preventing database access.
🎯 Exploit Status
Exploitation requires admin credentials but is straightforward once authenticated. The vulnerability is in filter query parameter handling in dependency listing endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 12.3.3
Vendor Advisory: https://github.com/pimcore/pimcore/security/advisories/GHSA-vxg3-v4p6-f3fp
Restart Required: No
Instructions:
1. Upgrade to Pimcore 12.3.3 or later. 2. For version 11.x, upgrade to a version beyond 11.5.14.1. 3. Apply the patch from commit 1c3925fbec4895abeb21e5c244a83679c4e4a6f4 if manual patching is needed.
🔧 Temporary Workarounds
Restrict Admin Access
allLimit admin panel access to only trusted users and implement strong authentication controls.
Network Segmentation
allIsolate Pimcore instances from critical databases and other sensitive systems.
🧯 If You Can't Patch
- Implement strict access controls and monitor admin user activities closely.
- Deploy web application firewall (WAF) rules to block SQL injection patterns in filter parameters.
🔍 How to Verify
Check if Vulnerable:
Check Pimcore version via admin panel or configuration files. If version is ≤11.5.14.1 or ≤12.3.2, the system is vulnerable.
Check Version:
Check Pimcore version in admin panel or review pimcore/config/version.php file.
Verify Fix Applied:
Verify version is ≥12.3.3 or >11.5.14.1. Check that filter query parameters are properly sanitized in dependency listing endpoints.
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries from admin users
- Multiple failed login attempts followed by successful admin login
- Suspicious filter parameter values in dependency listing requests
Network Indicators:
- Abnormal database traffic patterns from Pimcore application servers
- SQL error messages in HTTP responses
SIEM Query:
source="pimcore" AND (event="sql_error" OR param="filter" AND value CONTAINS "RLIKE")