Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.
History

Mon, 09 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.
Title Adminer has an Unauthenticated Persistent DoS via Array Injection in ?script=version Endpoint
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-09T21:26:45.224Z

Reserved: 2026-02-06T21:08:39.130Z

Link: CVE-2026-25892

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-09T22:16:04.023

Modified: 2026-02-09T22:16:04.023

Link: CVE-2026-25892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.