Miggo Logo

CVE-2025-62617: Admidio Vulnerable to Authenticated SQL Injection in Member Assignment Functionality

7.2

CVSS Score
3.1

Basic Information

EPSS Score
-
Published
10/22/2025
Updated
10/22/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
admidio/admidiocomposer<= 4.3.164.3.17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a classic SQL injection located in the adm_program/modules/groups-roles/members_assignment_data.php script. The filter_rol_uuid GET parameter is taken from user input and directly concatenated into a SQL query string without sufficient sanitization. This allows an authenticated user with the necessary permissions to execute arbitrary SQL commands, leading to a potential compromise of the database.

The analysis of the provided patch commit fde81ae869e88a3cf42201f2548d57df785a37cb confirms this. The change involves adding the StringUtils::strValidCharacters function to sanitize the filter_rol_uuid parameter, effectively neutralizing the SQL injection vector. The vulnerable code is not encapsulated within a specific function but resides in the main body of the PHP script. Therefore, the script members_assignment_data.php is the runtime indicator, as its execution is the entry point for the vulnerability.

Vulnerable functions

members_assignment_data.php
adm_program/modules/groups-roles/members_assignment_data.php
The vulnerability is in the PHP script `members_assignment_data.php`. This script processes a GET request and uses the `filter_rol_uuid` parameter to build a SQL query. The parameter was not sanitized, allowing an attacker to inject arbitrary SQL commands. The vulnerable code is in the global scope of the script, not within a specific function. Therefore, the script file itself is the vulnerable component that would be seen in a profiler.

WAF Protection Rules

WAF Rule

### Summ*ry *n *ut**nti**t** SQL inj**tion vuln*r**ility *xists in t** m*m**r *ssi*nm*nt **t* r*tri*v*l *un*tion*lity o* **mi*io. *ny *ut**nti**t** us*r wit* p*rmissions to *ssi*n m*m**rs to * rol* (su** *s *n **ministr*tor) **n *xploit t*is vuln*r*

Reasoning

T** vuln*r**ility is * *l*ssi* SQL inj**tion lo**t** in t** `**m_pro*r*m/mo*ul*s/*roups-rol*s/m*m**rs_*ssi*nm*nt_**t*.p*p` s*ript. T** `*ilt*r_rol_uui*` **T p*r*m*t*r is t*k*n *rom us*r input *n* *ir**tly *on**t*n*t** into * SQL qu*ry strin* wit*out