CVE-2026-25892

NameCVE-2026-25892
DescriptionAdminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
adminer (PTS)bullseye4.7.9-2fixed
bookworm4.8.1-1fixed
trixie5.2.1+dfsg-1fixed
forky, sid5.4.2+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
adminersource(unstable)(not affected)

Notes

- adminer <not-affected> (Vulnerable code not present)
https://github.com/advisories/GHSA-q4f2-39gr-45jh
Fixed by: https://github.com/vrana/adminer/commit/21d3a3150388677b18647d68aec93b7850e457d3 (v5.4.2)

Search for package or bug name: Reporting problems