Zend Framework vulnerable to SQL injection


Zend Framework is an open source web application framework. Zend Framework contains an SQL injection vulnerability (CWE-89) due to the argument of the ORDER BY clause.

Hiroshi Tokumaru of HASH Consulting Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.6 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: Low
CVSS V2 Severity:
Base Metrics 6.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
Affected Products

Zend Technologies Ltd.
  • Zend Framework 1.12.7 and earlier


An attacker who can access the product may execute SQL commands.

[Update the Software]
Update to the latest version according to the information provided by the developer.
This vulnerability has been addressed on 26 August, 2014.
Vendor Information

Zend Technologies Ltd.
CWE (What is CWE?)

  1. SQL Injection(CWE-89) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2014-4914

  1. JVN : JVN#71730320
  2. National Vulnerability Database (NVD) : CVE-2014-4914
Revision History

  • [2015/12/11]
      Web page was published
  • [2018/04/11]
      References : Content was added