Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q4f2-39gr-45jh Adminer has an Unauthenticated Persistent DoS via Array Injection in ?script=version Endpoint
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.
Title Adminer has an Unauthenticated Persistent DoS via Array Injection in ?script=version Endpoint
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-09T21:26:45.224Z

Reserved: 2026-02-06T21:08:39.130Z

Link: CVE-2026-25892

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-09T22:16:04.023

Modified: 2026-02-09T22:16:04.023

Link: CVE-2026-25892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses