CVE-2026-25076
Published: 13 March 2026
Summary
CVE-2026-25076 is a high-severity SQL Injection (CWE-89) vulnerability in Anchore Enterprise (inferred from references). Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Databases (T1213.006); ranked at the 11.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in the GraphQL API directly enables arbitrary database queries (collection from DB repositories) and data modifications (stored data manipulation).
NVD Description
Anchore Enterprise versions before 5.25.1 contain an SQL injection vulnerability in the GraphQL Reports API. An authenticated attacker that is able to access the GraphQL API could execute arbitrary SQL instructions resulting in modifications to the data contained in the…
more
Anchore Enterprise database.
Deeper analysisAI
CVE-2026-25076 is an SQL injection vulnerability (CWE-89) in the GraphQL Reports API of Anchore Enterprise versions before 5.25.1. It allows an authenticated attacker with access to the GraphQL API to execute arbitrary SQL instructions, resulting in modifications to data in the Anchore Enterprise database. The vulnerability carries a CVSS v3.1 base score of 7.3 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) and was published on 2026-03-13T19:54:18.827.
An attacker requires low privileges (PR:L) and adjacent network access (AV:A) to exploit this with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation enables arbitrary SQL execution, achieving high confidentiality (C:H) and integrity (I:H) impacts through data modifications, with no availability impact (A:N).
Anchore's release notes for version 5.25.1 address this issue, recommending upgrade to that version or later for mitigation. Additional details on the vulnerability and remediation are provided in advisories from Anchore and VulnCheck.
Details
- CWE(s)