Lookup for vulnerable packages by Package URL.
| Purl | pkg:composer/phpmyadmin/phpmyadmin@5.1.1 |
| Type | composer |
| Namespace | phpmyadmin |
| Name | phpmyadmin |
| Version | 5.1.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 5.2.2 |
| Latest_non_vulnerable_version | 5.2.2 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-araw-4wdy-hqcz |
| vulnerability_id |
VCID-araw-4wdy-hqcz |
| summary |
phpMyAdmin XSS when checking tables
An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the check tables feature. A crafted table or database name could be used for XSS. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24530 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41553 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41472 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41541 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41542 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41569 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41575 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41547 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41573 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24530 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-24530, GHSA-222v-cx2c-q2f5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-araw-4wdy-hqcz |
|
| 1 |
| url |
VCID-rqy8-n6fr-hqey |
| vulnerability_id |
VCID-rqy8-n6fr-hqey |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0813 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54905 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54888 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54908 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63043 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.62955 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63014 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63007 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63058 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63074 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63091 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63077 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63055 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0813 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0813, GHSA-vx8q-j7h9-vf6q
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rqy8-n6fr-hqey |
|
| 2 |
| url |
VCID-ym9b-4su6-6fbr |
| vulnerability_id |
VCID-ym9b-4su6-6fbr |
| summary |
Cross-site Scripting vulnerability in drag-and-drop upload of phpMyAdmin
In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger Cross-site Scripting (XSS) by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25727 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93405 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93434 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93428 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93423 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93425 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93445 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.9345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93451 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25727 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-25727, GHSA-6hr3-44gx-g6wh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ym9b-4su6-6fbr |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.1 |