Description
Adminer 4.8.1, when using Monolog for logging, allows a Denial of Service (memory consumption) via a crafted serialized payload (e.g., using s:1000000000), leading to a PHP Object Injection issue. Remote, unauthenticated attackers can trigger this by sending a malicious serialized object, which forces excessive memory usage, rendering Adminer’s interface unresponsive and causing a server-level DoS. While the server may recover after several minutes, multiple simultaneous requests can cause a complete crash requiring manual intervention.
Exploits (1)
References (4)
Core 4
Core References
Exploit, Third Party Advisory
https://github.com/far00t01/CVE-2025-43960
Release Notes
https://github.com/vrana/adminer/compare/v4.8.1...v4.8.2
Product
https://www.adminer.org
Scores
CVSS v3
8.6
EPSS
0.0062
EPSS Percentile
70.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-502
Status
published
Products (2)
adminer/adminer
4.8.1
vrana/adminer
0Packagist
Published
Aug 25, 2025
Tracked Since
Feb 18, 2026