CVE-2018-14058: Pimcore SQLi Vulnerability
6.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.80951%
CWE
Published
5/14/2022
Updated
7/25/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pimcore/pimcore | composer | <= 5.2.3 | 5.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in REST API endpoints (/asset-, /document-, /object-*) that accept 'condition' and 'id' parameters. These parameters flow directly into SQL query construction through the corresponding Listing classes' setCondition methods. The functions identified are: 1) Controller actions handling vulnerable API endpoints, 2) Model layer methods that directly incorporate user input into SQL queries without parameterization. High confidence comes from exploit documentation showing direct parameter injection and Pimcore's architecture patterns for REST handlers.