Vulnerability DatabaseGHSA-x2f4-8wxf-w3vf

GHSA-x2f4-8wxf-w3vf
PHP vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-x2f4-8wxf-w3vf) affects the Zend\Db component in Zend Framework 2, specifically impacting versions 2.0.0 through 2.0.8 and 2.1.0 through 2.1.4. The issue involves two methods, quoteValue() and quoteValueList(), which are used for SQL value quoting but failed to properly handle escapable characters, potentially leading to SQL injection vulnerabilities (Zend Advisory).

Technical details

The vulnerability stems from a flaw in the quoteValue() and quoteValueList() methods within the Zend\Db\Adapter\Platform* objects. These methods did not account for all possible escapable characters needed when creating quoted values for SQL string interpolation. Additionally, the methods performed value quoting without extension level coordination, which should have taken character-sets into consideration when quoting (Zend Advisory). The vulnerability has been assigned a CVSS v3.1 score of 8.8 (High), with attack vector being Network and requiring low attack complexity (GitHub Advisory).

Impact

If exploited, this vulnerability could lead to SQL injection attacks, potentially allowing unauthorized access to or modification of database contents. The vulnerability affects applications that directly consume specific APIs including Zend\Db\Adapter\Platform::quoteValue(), Zend\Db\Adapter\Platform::quoteValueList(), and various getSqlString() methods in the Zend\Db\Sql namespace (Zend Advisory).

Mitigation and workarounds

The issue has been patched in versions 2.0.8 and 2.1.4. The fix includes modifications to Platform objects to accept the Driver as an optional parameter, allowing quoteValue() to use driver-level quoting/escaping mechanisms. A new API, Zend\Db\Adapter\Platform\PlatformInterface::quoteTrustedValue(), was introduced for use cases requiring quoting without warning triggers. Users are strongly recommended to upgrade to either version 2.0.8 or 2.1.4 (Zend Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-q3x8-6898-23g3MEDIUM6.9
  • PHPPHP
  • ibexa/user
NoYesOct 17, 2025
CVE-2025-62418MEDIUM6.9
  • PHPPHP
  • bagisto/bagisto
NoYesOct 16, 2025
GHSA-8c2g-f8jm-5cr7MEDIUM4.8
  • PHPPHP
  • ibexa/fieldtype-richtext
NoYesOct 17, 2025
GHSA-2mx6-fq24-g2mhMEDIUM4.8
  • PHPPHP
  • ibexa/admin-ui
NoYesOct 17, 2025
GHSA-99c7-c3mw-mxhvMEDIUM4.8
  • PHPPHP
  • ezsystems/ezplatform-admin-ui
NoYesOct 17, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management