Pimcore is an Open Source Data & Experience Management Platform. In versions up to and including 11.5.14.1 and 12.3.2, the filter query parameter in the dependency listing endpoints is JSON-decoded and the value field is concatenated directly into RLIKE clauses without sanitization or parameterized queries. Exploiting this issue requires admin authentication. An attacker with admin panel access can extract the full database including password hashes of other admin users. Version 12.3.3 contains a patch.
History

Tue, 24 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description Pimcore is an Open Source Data & Experience Management Platform. In versions up to and including 11.5.14.1 and 12.3.2, the filter query parameter in the dependency listing endpoints is JSON-decoded and the value field is concatenated directly into RLIKE clauses without sanitization or parameterized queries. Exploiting this issue requires admin authentication. An attacker with admin panel access can extract the full database including password hashes of other admin users. Version 12.3.3 contains a patch.
Title Pimcore vulnerable to SQL injection via unsanitized filter value in Dependency Dao RLIKE clause
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-24T02:50:48.287Z

Reserved: 2026-02-19T17:25:31.100Z

Link: CVE-2026-27461

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-24T04:15:58.787

Modified: 2026-02-24T04:15:58.787

Link: CVE-2026-27461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.