Vulnerability Description
Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adminer | Adminer | >= 4.6.2, < 5.4.2 |
Related Weaknesses (CWE)
References
- https://github.com/vrana/adminer/commit/21d3a3150388677b18647d68aec93b7850e457d3Patch
- https://github.com/vrana/adminer/releases/tag/v5.4.2ProductRelease Notes
- https://github.com/vrana/adminer/security/advisories/GHSA-q4f2-39gr-45jhExploitVendor Advisory
FAQ
What is CVE-2026-25892?
CVE-2026-25892 is a vulnerability with a CVSS score of 7.5 (HIGH). Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser ...
How severe is CVE-2026-25892?
CVE-2026-25892 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25892?
Check the references section above for vendor advisories and patch information. Affected products include: Adminer Adminer.