Search for packages
| purl | pkg:composer/phpmyadmin/phpmyadmin@4.9.7 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2jjv-4en4-e3gx
Aliases: CVE-2020-22278 |
phpMyAdmin through 5.0.2 allows CSV injection via Export Section. NOTE: the vendor disputes this because "the CSV file is accurately generated based on the database contents. |
Affected by 3 other vulnerabilities. |
|
VCID-na3j-h3qr-k7dc
Aliases: CVE-2022-23807 GHSA-8wf2-3ggj-78q9 |
Improper Authentication An issue was discovered in phpMyAdm. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. |
Affected by 2 other vulnerabilities. Affected by 11 other vulnerabilities. Affected by 2 other vulnerabilities. |
|
VCID-rqy8-n6fr-hqey
Aliases: CVE-2022-0813 GHSA-vx8q-j7h9-vf6q |
Exposure of Sensitive Information to an Unauthorized Actor PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section. |
Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. |
|
VCID-ym9b-4su6-6fbr
Aliases: CVE-2023-25727 GHSA-6hr3-44gx-g6wh |
Cross-site Scripting vulnerability in drag-and-drop upload of phpMyAdmin In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger Cross-site Scripting (XSS) by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability. |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||