Vulnerability Description
EGroupware is a Web based groupware server written in PHP. A SQL Injection vulnerability exists in the core components of EGroupware prior to versions 23.1.20260113 and 26.0.20260113, specifically in the `Nextmatch` filter processing. The flaw allows authenticated attackers to inject arbitrary SQL commands into the `WHERE` clause of database queries. This is achieved by exploiting a PHP type juggling issue where JSON decoding converts numeric strings into integers, bypassing the `is_int()` security check used by the application. Versions 23.1.20260113 and 26.0.20260113 patch the vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Egroupware | Egroupware | < 23.1.20260113 |
Related Weaknesses (CWE)
References
- https://github.com/EGroupware/egroupware/releases/tag/23.1.20260113ProductRelease Notes
- https://github.com/EGroupware/egroupware/releases/tag/26.0.20260113ProductRelease Notes
- https://github.com/EGroupware/egroupware/security/advisories/GHSA-rvxj-7f72-mhrxExploitMitigationVendor Advisory
FAQ
What is CVE-2026-22243?
CVE-2026-22243 is a vulnerability with a CVSS score of 8.8 (HIGH). EGroupware is a Web based groupware server written in PHP. A SQL Injection vulnerability exists in the core components of EGroupware prior to versions 23.1.20260113 and 26.0.20260113, specifically in ...
How severe is CVE-2026-22243?
CVE-2026-22243 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-22243?
Check the references section above for vendor advisories and patch information. Affected products include: Egroupware Egroupware.