PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-4861 Fedoraproject CVE debrief

Zend Framework’s Zend_Db_Select order() and group() methods were vulnerable to SQL injection when SQL comments were not removed before validation. NVD rates the issue critical, and the affected range is listed as Zend Framework before 1.12.20.

Vendor
Fedoraproject
Product
CVE-2016-4861
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-17
Original CVE updated
2026-05-13
Advisory published
2017-02-17
Advisory updated
2026-05-13

Who should care

Teams running Zend Framework applications, especially code that uses Zend_Db_Select::order() or ::group(), and operators of packaged deployments that may include affected Zend Framework builds.

Technical summary

The issue is classified as CWE-89 SQL injection. According to the NVD record, Zend_Db_Select’s order and group methods failed to strip SQL comments before validation, which could let attacker-controlled input alter the resulting SQL. NVD assigns CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerable Zend Framework range is before 1.12.20, and the NVD CPE data also marks Fedora 23, 24, and 25 as vulnerable.

Defensive priority

Critical — patch immediately.

Recommended defensive actions

  • Upgrade Zend Framework to 1.12.20 or later everywhere it is used.
  • Audit application code for user-controlled inputs passed into Zend_Db_Select::order() and ::group().
  • Confirm downstream packages and vendor builds are updated, including any Fedora package references tied to this CVE.
  • Add regression tests for query-building paths that use SQL fragments, comments, or other nontrivial input.
  • If patching cannot happen immediately, reduce exposure of affected endpoints and monitor for unusual SQL errors or suspicious query patterns.

Evidence notes

This debrief is based on the official CVE and NVD records plus the linked Zend and JVN advisories. The NVD record identifies the weakness as CWE-89 and rates it CVSS 3.0 9.8. The source data lists Zend Framework versions before 1.12.20 as vulnerable and includes Fedora 23/24/25 CPE entries marked vulnerable. No exploit code or reproduction details are included here.

Official resources

Publicly disclosed in the CVE/NVD record on 2017-02-17, with later NVD updates reflected on 2026-05-13.