Admidio Vulnerable to Authenticated SQL Injection in Member Assignment Functionality
Description
Admidio is an open-source user management solution. Prior to version 4.3.17, an authenticated SQL injection vulnerability exists in the member assignment data retrieval functionality of Admidio. Any authenticated user with permissions to assign members to a role (such as an administrator) can exploit this vulnerability to execute arbitrary SQL commands. This can lead to a full compromise of the application's database, including reading, modifying, or deleting all data. This issue has been patched in version 4.3.17.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authenticated SQL injection in Admidio's member assignment functionality allows attackers with role assignment permissions to execute arbitrary SQL commands, leading to full database compromise.
Vulnerability
Overview
CVE-2025-62617 is an authenticated SQL injection vulnerability in Admidio, an open-source user management system, affecting versions prior to 4.3.17. The flaw resides in the adm_program/modules/groups-roles/members_assignment_data.php script, which handles AJAX requests for fetching user lists during role assignment. The filter_rol_uuid GET parameter is retrieved without proper sanitization for SQL context and is directly concatenated into a raw SQL query, allowing an attacker to inject arbitrary SQL commands [1][2].
Exploitation
Details
To exploit this vulnerability, an attacker must be an authenticated user with permissions to assign members to a role, such as an administrator. The vulnerable parameter is passed via a GET request, and the injected SQL is executed within a subselect query that retrieves member counts. No special network position is required beyond access to the Admidio web interface [2]. The commit that fixes the issue shows that the parameter is now sanitized using StringUtils::strValidCharacters with the 'noSpecialChar' option, which strips special characters that could be used for injection [4].
Impact
Successful exploitation allows an attacker to execute arbitrary SQL commands against the application's database. This can lead to reading, modifying, or deleting all data stored in the database, potentially resulting in a full compromise of the application and its data [1][2].
Mitigation
The vulnerability has been patched in Admidio version 4.3.17. Users are strongly advised to upgrade to this version or later to remediate the issue. No workarounds have been publicly documented, and the vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
admidio/admidioPackagist | < 4.3.17 | 4.3.17 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-2v5m-cq9w-fc33ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-62617ghsaADVISORY
- github.com/Admidio/admidio/commit/fde81ae869e88a3cf42201f2548d57df785a37cbghsax_refsource_MISCWEB
- github.com/Admidio/admidio/security/advisories/GHSA-2v5m-cq9w-fc33ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.