Lookup for vulnerable packages by Package URL.

Purlpkg:composer/phpmyadmin/phpmyadmin@5.1.2
Typecomposer
Namespacephpmyadmin
Namephpmyadmin
Version5.1.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version5.2.2
Latest_non_vulnerable_version5.2.2
Affected_by_vulnerabilities
0
url VCID-araw-4wdy-hqcz
vulnerability_id VCID-araw-4wdy-hqcz
summary
phpMyAdmin XSS when checking tables
An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the check tables feature. A crafted table or database name could be used for XSS.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24530
reference_id
reference_type
scores
0
value 0.00196
scoring_system epss
scoring_elements 0.41553
published_at 2026-04-09T12:55:00Z
1
value 0.00196
scoring_system epss
scoring_elements 0.41472
published_at 2026-04-21T12:55:00Z
2
value 0.00196
scoring_system epss
scoring_elements 0.41541
published_at 2026-04-02T12:55:00Z
3
value 0.00196
scoring_system epss
scoring_elements 0.41528
published_at 2026-04-13T12:55:00Z
4
value 0.00196
scoring_system epss
scoring_elements 0.41542
published_at 2026-04-12T12:55:00Z
5
value 0.00196
scoring_system epss
scoring_elements 0.41569
published_at 2026-04-04T12:55:00Z
6
value 0.00196
scoring_system epss
scoring_elements 0.41495
published_at 2026-04-07T12:55:00Z
7
value 0.00196
scoring_system epss
scoring_elements 0.41545
published_at 2026-04-08T12:55:00Z
8
value 0.00196
scoring_system epss
scoring_elements 0.41575
published_at 2026-04-11T12:55:00Z
9
value 0.00196
scoring_system epss
scoring_elements 0.41547
published_at 2026-04-18T12:55:00Z
10
value 0.00196
scoring_system epss
scoring_elements 0.41573
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24530
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24530
2
reference_url https://github.com/phpmyadmin/phpmyadmin
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin
3
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/23c13a81709728089ff031e5b1c29b5e91baa6a7
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/23c13a81709728089ff031e5b1c29b5e91baa6a7
4
reference_url https://lists.debian.org/debian-lts-announce/2025/04/msg00016.html
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2025/04/msg00016.html
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-24530
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-24530
6
reference_url https://www.phpmyadmin.net/security/PMASA-2025-1
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2025-1
7
reference_url https://github.com/advisories/GHSA-222v-cx2c-q2f5
reference_id GHSA-222v-cx2c-q2f5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-222v-cx2c-q2f5
8
reference_url https://www.phpmyadmin.net/security/PMASA-2025-1/
reference_id PMASA-2025-1
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T15:02:00Z/
url https://www.phpmyadmin.net/security/PMASA-2025-1/
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@5.2.2
purl pkg:composer/phpmyadmin/phpmyadmin@5.2.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.2.2
aliases CVE-2025-24530, GHSA-222v-cx2c-q2f5
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-araw-4wdy-hqcz
1
url VCID-ym9b-4su6-6fbr
vulnerability_id VCID-ym9b-4su6-6fbr
summary
Cross-site Scripting vulnerability in drag-and-drop upload of phpMyAdmin
In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger Cross-site Scripting (XSS) by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25727
reference_id
reference_type
scores
0
value 0.1094
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-13T12:55:00Z
1
value 0.1094
scoring_system epss
scoring_elements 0.93434
published_at 2026-04-21T12:55:00Z
2
value 0.1094
scoring_system epss
scoring_elements 0.93428
published_at 2026-04-18T12:55:00Z
3
value 0.1094
scoring_system epss
scoring_elements 0.93423
published_at 2026-04-16T12:55:00Z
4
value 0.11079
scoring_system epss
scoring_elements 0.93425
published_at 2026-04-02T12:55:00Z
5
value 0.11079
scoring_system epss
scoring_elements 0.93433
published_at 2026-04-07T12:55:00Z
6
value 0.11079
scoring_system epss
scoring_elements 0.93441
published_at 2026-04-08T12:55:00Z
7
value 0.11079
scoring_system epss
scoring_elements 0.93445
published_at 2026-04-09T12:55:00Z
8
value 0.11079
scoring_system epss
scoring_elements 0.9345
published_at 2026-04-11T12:55:00Z
9
value 0.11079
scoring_system epss
scoring_elements 0.93451
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25727
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25727
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/53f70fd7f3b388639922e6cc1ca51fbe890c91cc
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/53f70fd7f3b388639922e6cc1ca51fbe890c91cc
4
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/efa2406695551667f726497750d3db91fb6f662e
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/efa2406695551667f726497750d3db91fb6f662e
5
reference_url https://www.phpmyadmin.net/security/PMASA-2023-1
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2023-1
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25727
reference_id CVE-2023-25727
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-25727
7
reference_url https://github.com/advisories/GHSA-6hr3-44gx-g6wh
reference_id GHSA-6hr3-44gx-g6wh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6hr3-44gx-g6wh
8
reference_url https://www.phpmyadmin.net/security/PMASA-2023-1/
reference_id PMASA-2023-1
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T14:52:37Z/
url https://www.phpmyadmin.net/security/PMASA-2023-1/
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@5.2.1
purl pkg:composer/phpmyadmin/phpmyadmin@5.2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-araw-4wdy-hqcz
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.2.1
aliases CVE-2023-25727, GHSA-6hr3-44gx-g6wh
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ym9b-4su6-6fbr
Fixing_vulnerabilities
0
url VCID-na3j-h3qr-k7dc
vulnerability_id VCID-na3j-h3qr-k7dc
summary
Improper Authentication
An issue was discovered in phpMyAdm. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23807
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35008
published_at 2026-04-21T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35107
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35135
published_at 2026-04-04T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35014
published_at 2026-04-07T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35059
published_at 2026-04-08T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35085
published_at 2026-04-09T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35089
published_at 2026-04-11T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35055
published_at 2026-04-12T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.3503
published_at 2026-04-13T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-16T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.35053
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23807
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23807
2
reference_url https://github.com/phpmyadmin/phpmyadmin
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin
3
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32
4
reference_url https://security.gentoo.org/glsa/202311-17
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202311-17
5
reference_url https://www.phpmyadmin.net/security/PMASA-2022-1
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2022-1
6
reference_url https://www.phpmyadmin.net/security/PMASA-2022-1/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/security/PMASA-2022-1/
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23807
reference_id CVE-2022-23807
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23807
8
reference_url https://github.com/advisories/GHSA-8wf2-3ggj-78q9
reference_id GHSA-8wf2-3ggj-78q9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8wf2-3ggj-78q9
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@4.9.8
purl pkg:composer/phpmyadmin/phpmyadmin@4.9.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rqy8-n6fr-hqey
1
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.9.8
1
url pkg:composer/phpmyadmin/phpmyadmin@5.0.0
purl pkg:composer/phpmyadmin/phpmyadmin@5.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-41mv-6vqr-sua6
3
vulnerability VCID-5657-kcyh-7bc2
4
vulnerability VCID-araw-4wdy-hqcz
5
vulnerability VCID-mk34-h4nz-b3ey
6
vulnerability VCID-ngtc-xtjn-xbhp
7
vulnerability VCID-rqy8-n6fr-hqey
8
vulnerability VCID-tks3-6uv4-kygf
9
vulnerability VCID-ym9b-4su6-6fbr
10
vulnerability VCID-znfm-ak2t-mqdd
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.0.0
2
url pkg:composer/phpmyadmin/phpmyadmin@5.1.2
purl pkg:composer/phpmyadmin/phpmyadmin@5.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-araw-4wdy-hqcz
1
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.2
aliases CVE-2022-23807, GHSA-8wf2-3ggj-78q9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-na3j-h3qr-k7dc
1
url VCID-ndjn-p6gb-u7g4
vulnerability_id VCID-ndjn-p6gb-u7g4
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23808
reference_id
reference_type
scores
0
value 0.4879
scoring_system epss
scoring_elements 0.97765
published_at 2026-04-16T12:55:00Z
1
value 0.4879
scoring_system epss
scoring_elements 0.97768
published_at 2026-04-21T12:55:00Z
2
value 0.68413
scoring_system epss
scoring_elements 0.98609
published_at 2026-04-12T12:55:00Z
3
value 0.68413
scoring_system epss
scoring_elements 0.98608
published_at 2026-04-11T12:55:00Z
4
value 0.68413
scoring_system epss
scoring_elements 0.98606
published_at 2026-04-09T12:55:00Z
5
value 0.68413
scoring_system epss
scoring_elements 0.98605
published_at 2026-04-08T12:55:00Z
6
value 0.68413
scoring_system epss
scoring_elements 0.98603
published_at 2026-04-07T12:55:00Z
7
value 0.68413
scoring_system epss
scoring_elements 0.98597
published_at 2026-04-02T12:55:00Z
8
value 0.68413
scoring_system epss
scoring_elements 0.98601
published_at 2026-04-04T12:55:00Z
9
value 0.68413
scoring_system epss
scoring_elements 0.9861
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23808
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23808
2
reference_url https://github.com/phpmyadmin/phpmyadmin
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin
3
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/44eb12f15a562718bbe54c9a16af91ceea335d59
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/44eb12f15a562718bbe54c9a16af91ceea335d59
4
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/5118acce1dfcdb09cbc0f73927bf51c46feeaf38
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/5118acce1dfcdb09cbc0f73927bf51c46feeaf38
5
reference_url https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:03Z/
url https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97
6
reference_url https://security.gentoo.org/glsa/202311-17
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:03Z/
url https://security.gentoo.org/glsa/202311-17
7
reference_url https://www.phpmyadmin.net/security/PMASA-2022-2
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2022-2
8
reference_url https://www.phpmyadmin.net/security/PMASA-2022-2/
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:03Z/
url https://www.phpmyadmin.net/security/PMASA-2022-2/
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23808
reference_id CVE-2022-23808
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23808
10
reference_url https://github.com/advisories/GHSA-vcwc-6mr9-8m7c
reference_id GHSA-vcwc-6mr9-8m7c
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vcwc-6mr9-8m7c
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@5.1.2
purl pkg:composer/phpmyadmin/phpmyadmin@5.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-araw-4wdy-hqcz
1
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.2
aliases CVE-2022-23808, GHSA-vcwc-6mr9-8m7c
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ndjn-p6gb-u7g4
2
url VCID-rqy8-n6fr-hqey
vulnerability_id VCID-rqy8-n6fr-hqey
summary
Exposure of Sensitive Information to an Unauthorized Actor
PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0813
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.54905
published_at 2026-04-16T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54888
published_at 2026-04-21T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54908
published_at 2026-04-18T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63043
published_at 2026-04-04T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.62955
published_at 2026-04-01T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63014
published_at 2026-04-02T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63007
published_at 2026-04-07T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63058
published_at 2026-04-08T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63074
published_at 2026-04-09T12:55:00Z
9
value 0.00437
scoring_system epss
scoring_elements 0.63091
published_at 2026-04-11T12:55:00Z
10
value 0.00437
scoring_system epss
scoring_elements 0.63077
published_at 2026-04-12T12:55:00Z
11
value 0.00437
scoring_system epss
scoring_elements 0.63055
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0813
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0813
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202311-17
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202311-17
4
reference_url https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information
reference_id
reference_type
scores
url https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information
5
reference_url https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released
6
reference_url https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-0813
reference_id CVE-2022-0813
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-0813
8
reference_url https://github.com/advisories/GHSA-vx8q-j7h9-vf6q
reference_id GHSA-vx8q-j7h9-vf6q
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vx8q-j7h9-vf6q
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@5.1.2
purl pkg:composer/phpmyadmin/phpmyadmin@5.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-araw-4wdy-hqcz
1
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.2
1
url pkg:composer/phpmyadmin/phpmyadmin@5.1.3
purl pkg:composer/phpmyadmin/phpmyadmin@5.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-araw-4wdy-hqcz
1
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.3
aliases CVE-2022-0813, GHSA-vx8q-j7h9-vf6q
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rqy8-n6fr-hqey
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.2