PatchSiren cyber security CVE debrief
CVE-2016-4861 Fedoraproject CVE debrief
Zend Framework’s Zend_Db_Select order() and group() methods were vulnerable to SQL injection when SQL comments were not removed before validation. NVD rates the issue critical, and the affected range is listed as Zend Framework before 1.12.20.
- Vendor
- Fedoraproject
- Product
- CVE-2016-4861
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Teams running Zend Framework applications, especially code that uses Zend_Db_Select::order() or ::group(), and operators of packaged deployments that may include affected Zend Framework builds.
Technical summary
The issue is classified as CWE-89 SQL injection. According to the NVD record, Zend_Db_Select’s order and group methods failed to strip SQL comments before validation, which could let attacker-controlled input alter the resulting SQL. NVD assigns CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerable Zend Framework range is before 1.12.20, and the NVD CPE data also marks Fedora 23, 24, and 25 as vulnerable.
Defensive priority
Critical — patch immediately.
Recommended defensive actions
- Upgrade Zend Framework to 1.12.20 or later everywhere it is used.
- Audit application code for user-controlled inputs passed into Zend_Db_Select::order() and ::group().
- Confirm downstream packages and vendor builds are updated, including any Fedora package references tied to this CVE.
- Add regression tests for query-building paths that use SQL fragments, comments, or other nontrivial input.
- If patching cannot happen immediately, reduce exposure of affected endpoints and monitor for unusual SQL errors or suspicious query patterns.
Evidence notes
This debrief is based on the official CVE and NVD records plus the linked Zend and JVN advisories. The NVD record identifies the weakness as CWE-89 and rates it CVSS 3.0 9.8. The source data lists Zend Framework versions before 1.12.20 as vulnerable and includes Fedora 23/24/25 CPE entries marked vulnerable. No exploit code or reproduction details are included here.
Official resources
-
CVE-2016-4861 CVE record
CVE.org
-
CVE-2016-4861 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Exploit, Technical Description, Vendor Advisory
- Source reference
- Source reference
- Source reference
- Source reference
Publicly disclosed in the CVE/NVD record on 2017-02-17, with later NVD updates reflected on 2026-05-13.