Lookup for vulnerable packages by Package URL.
| Purl | pkg:composer/phpmyadmin/phpmyadmin@5.1.2 |
| Type | composer |
| Namespace | phpmyadmin |
| Name | phpmyadmin |
| Version | 5.1.2 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 5.2.2 |
| Latest_non_vulnerable_version | 5.2.2 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-araw-4wdy-hqcz |
| vulnerability_id |
VCID-araw-4wdy-hqcz |
| summary |
phpMyAdmin XSS when checking tables
An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the check tables feature. A crafted table or database name could be used for XSS. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24530 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41553 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41472 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41541 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41542 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41569 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41575 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41547 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41573 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24530 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-24530, GHSA-222v-cx2c-q2f5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-araw-4wdy-hqcz |
|
| 1 |
| url |
VCID-ym9b-4su6-6fbr |
| vulnerability_id |
VCID-ym9b-4su6-6fbr |
| summary |
Cross-site Scripting vulnerability in drag-and-drop upload of phpMyAdmin
In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger Cross-site Scripting (XSS) by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25727 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93405 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93434 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93428 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93423 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93425 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93445 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.9345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93451 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25727 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-25727, GHSA-6hr3-44gx-g6wh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ym9b-4su6-6fbr |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-na3j-h3qr-k7dc |
| vulnerability_id |
VCID-na3j-h3qr-k7dc |
| summary |
Improper Authentication
An issue was discovered in phpMyAdm. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23807 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35008 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35135 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35014 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35059 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35085 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35089 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35055 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.3503 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35068 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35053 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23807 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-23807, GHSA-8wf2-3ggj-78q9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-na3j-h3qr-k7dc |
|
| 1 |
| url |
VCID-ndjn-p6gb-u7g4 |
| vulnerability_id |
VCID-ndjn-p6gb-u7g4 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23808 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.4879 |
| scoring_system |
epss |
| scoring_elements |
0.97765 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.4879 |
| scoring_system |
epss |
| scoring_elements |
0.97768 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.68413 |
| scoring_system |
epss |
| scoring_elements |
0.98609 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.68413 |
| scoring_system |
epss |
| scoring_elements |
0.98608 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.68413 |
| scoring_system |
epss |
| scoring_elements |
0.98606 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.68413 |
| scoring_system |
epss |
| scoring_elements |
0.98605 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.68413 |
| scoring_system |
epss |
| scoring_elements |
0.98603 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.68413 |
| scoring_system |
epss |
| scoring_elements |
0.98597 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.68413 |
| scoring_system |
epss |
| scoring_elements |
0.98601 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.68413 |
| scoring_system |
epss |
| scoring_elements |
0.9861 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23808 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-23808, GHSA-vcwc-6mr9-8m7c
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ndjn-p6gb-u7g4 |
|
| 2 |
| url |
VCID-rqy8-n6fr-hqey |
| vulnerability_id |
VCID-rqy8-n6fr-hqey |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0813 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54905 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54888 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54908 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63043 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.62955 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63014 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63007 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63058 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63074 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63091 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63077 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63055 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0813 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0813, GHSA-vx8q-j7h9-vf6q
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rqy8-n6fr-hqey |
|
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.2 |