VYPR
High severity7.3NVD Advisory· Published Mar 13, 2026· Updated Apr 15, 2026

CVE-2026-25076

CVE-2026-25076

Description

Anchore Enterprise versions before 5.25.1 contain an SQL injection vulnerability in the GraphQL Reports API. An authenticated attacker that is able to access the GraphQL API could execute arbitrary SQL instructions resulting in modifications to the data contained in the Anchore Enterprise database.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Anchored Enterprise before 5.25.1 has an SQL injection in the GraphQL Reports API, allowing authenticated attackers to modify the database.

Vulnerability

Analysis

CVE-2026-25076 is an SQL injection vulnerability in the GraphQL Reports API of Anchore Enterprise versions prior to 5.25.1 [2]. The root cause is improper sanitization of user-supplied input within the GraphQL Reports API, allowing crafted queries to inject arbitrary SQL commands [3].

Exploitation

An attacker must be authenticated and able to access the Anchore Enterprise GraphQL API [3]. The vulnerability is in the Reports API, which suggests the attack vector is through network access to the affected service. The attacker does not need special privileges beyond standard API access. Exploitation involves sending maliciously crafted GraphQL queries that, when processed, lead to SQL injection [3].

Impact

Successful exploitation enables an authenticated attacker to execute arbitrary SQL commands on the Anchore Enterprise database [2][3]. This can lead to unauthorized modification of data stored in the database, such as altering vulnerability results, compliance data, or potentially impacting system configuration [1]. The vulnerability does not require the attacker to be on the same network (AV:A in CVSS), but the CVSS vector indicates high impact to confidentiality and integrity [3].

Mitigation

The vulnerability is fixed in Anchore Enterprise version 5.25.1 [2]. Users should upgrade to this version or beyond this version. No workarounds are mentioned in the references. The issue was reported by Andrew Van Fleteren [2][3].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.