phpIPAM 1.4.4 - SQL Injection


Name phpIPAM 1.4.4 - SQL Injection
Code name Mercury
Product phpIPAM
Affected versions 1.4.4
Fixed versions 1.4.5
State Public
Release date 2022-01-18


Kind SQL injection
Rule 010. SQL injection
Remote Yes
CVSSv3 Vector CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
CVSSv3 Base Score 4.7
Exploit available No
CVE ID(s) CVE-2022-23046


phpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php.

Proof of Concept

Steps to reproduce

  1. Go to settings and enable the routing module.
  2. Go to show routing.
  3. Click on "Add peer" and create a new "BGP peer".
  4. Click on the newly created "BGP peer".
  5. Click on "Actions" and go to "Subnet Mapping".
  6. Scroll down to "Map new subnet".
  7. Insert an SQL Injection sentence inside the search parameter, for example: " union select @@version,2,user(),4 -- -.

System Information

  • Version: phpIPAM IP address management v1.4.4.
  • Operating System: Linux.
  • Web Server: Apache
  • PHP Version: 7.4
  • Database and version: Mysql


There is no exploit for the vulnerability but can be manually exploited.


An updated version of phpIPAM is available at the vendor page.


The vulnerability was discovered by Oscar Uribe from the Offensive Team of Fluid Attacks.


Vendor page
Patched version


  • 2022-01-06: Vulnerability discovered.

  • 2022-01-07: Vendor contacted.

  • 2022-01-07: Vendor replied acknowledging the report.

  • 2022-01-17: Vulnerability patched.

  • 2022-01-18: Public Disclosure.