Search for packages
| purl | pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1 |
| Next non-vulnerable version | 4:5.2.2-really+dfsg-1+deb13u1 |
| Latest non-vulnerable version | 4:5.2.2-really+dfsg-1+deb13u1 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2wka-nyka-9fbz
Aliases: CVE-2025-24529 |
An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the Insert tab. |
Affected by 1 other vulnerability. |
|
VCID-araw-4wdy-hqcz
Aliases: CVE-2025-24530 GHSA-222v-cx2c-q2f5 |
phpMyAdmin XSS when checking tables An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the check tables feature. A crafted table or database name could be used for XSS. |
Affected by 1 other vulnerability. |
|
VCID-na3j-h3qr-k7dc
Aliases: CVE-2022-23807 GHSA-8wf2-3ggj-78q9 |
Improper Authentication An issue was discovered in phpMyAdm. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. |
Affected by 1 other vulnerability. |
|
VCID-ndjn-p6gb-u7g4
Aliases: CVE-2022-23808 GHSA-vcwc-6mr9-8m7c |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection. |
Affected by 1 other vulnerability. |
|
VCID-rqy8-n6fr-hqey
Aliases: CVE-2022-0813 GHSA-vx8q-j7h9-vf6q |
Exposure of Sensitive Information to an Unauthorized Actor PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section. |
Affected by 1 other vulnerability. |
|
VCID-ym9b-4su6-6fbr
Aliases: CVE-2023-25727 GHSA-6hr3-44gx-g6wh |
Cross-site Scripting vulnerability in drag-and-drop upload of phpMyAdmin In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger Cross-site Scripting (XSS) by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability. |
Affected by 1 other vulnerability. |
|
VCID-zd8d-c1nk-g7a4
Aliases: CVE-2025-3573 GHSA-rrj2-ph5q-jxw2 |
jquery-validation vulnerable to Cross-site Scripting Versions of the package jquery-validation before 1.20.0 are vulnerable to Cross-site Scripting (XSS) in the showLabel() function, which may take input from a user-controlled placeholder value. This value will populate a message via $.validator.messages in a user localizable dictionary. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2y3v-jnph-hfh4 | Multiple vulnerabilities have been found in phpMyAdmin, allowing remote attackers to conduct XSS. |
CVE-2020-26935
GHSA-7ff4-cv53-4cjq |
| VCID-41mv-6vqr-sua6 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') SQL Injection vulnerability in function getTableCreationQuery in CreateAddField.php in phpMyAdmin 5.x before 5.2.0 via the tbl_storage_engine or tbl_collation parameters to tbl_create.php. |
CVE-2020-22452
GHSA-prcg-mc23-hgjh |
| VCID-5657-kcyh-7bc2 | phpMyAdmin SQL injection in user accounts page In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server. |
CVE-2020-5504
GHSA-fgj8-93xx-f6g6 |
| VCID-986a-3m4g-83ge | Cross-Site Request Forgery (CSRF) By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new `tables/routines`, deleting designer pages, `adding/deleting` users, updating user passwords, killing SQL processes. |
CVE-2018-19969
GHSA-xwf2-53mc-r8hx |
| VCID-a286-32jj-eubk | Regular Expression Denial of Service in jquery-validation The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation. The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service) This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen). |
CVE-2021-21252
GHSA-jxwx-85vp-gvwm |
| VCID-br1c-5bzf-ufeu | SQL Injection An issue was discovered in phpMyAdmin. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature. |
CVE-2019-6798
GHSA-f732-fxh6-g4qj |
| VCID-c91y-txcw-2kdy | Cross-site Scripting An issue was discovered in `js/designer/move.js` in phpMyAdm A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature. |
CVE-2018-12581
GHSA-vxj6-pm6r-23hq |
| VCID-ebk2-vjau-57h9 | Information Exposure An attacker can exploit phpMyAdm to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system. |
CVE-2018-19968
GHSA-xc97-r49q-cxgc |
| VCID-ftdj-p5as-97hd | Cross-Site Request Forgery (CSRF) phpMyAdm has CSRF, allowing an attacker to execute arbitrary SQL statements, related to `js/db_operations.js`, `js/tbl_operations.js`, `libraries/classes/Operations.php`, and `sql.php.` |
CVE-2018-10188
GHSA-v6fp-h79x-9rqc |
| VCID-g6ud-92qe-hqcx | phpMyAdmin unsanitized Git information phpMyAdmin before 4.9.2 does not escape certain Git information, related to `libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php`. |
CVE-2019-19617
GHSA-pgph-mc4p-f8c3 |
| VCID-gu4y-aeqx-mqak | SQL injection in phpMyAdmin An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature. |
CVE-2019-18622
GHSA-jgjc-332c-8cmc |
| VCID-jma9-9uhu-xuc3 | SQL Injection A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature. |
CVE-2019-11768
GHSA-x37v-98f9-mj32 |
| VCID-mk34-h4nz-b3ey | Multiple vulnerabilities have been found in phpMyAdmin, allowing remote attackers to conduct XSS. |
CVE-2020-26934
GHSA-6349-53vr-7hcr |
| VCID-mwtw-n1tv-hfd9 | Cross-site Scripting Cross-site scripting (XSS) vulnerability in `db_central_columns.php` in phpMyAdm allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. |
CVE-2018-7260
GHSA-gqmj-f46x-wqhw |
| VCID-ngtc-xtjn-xbhp | phpMyAdmin SQL injection vulnerability In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table. |
CVE-2020-10802
GHSA-f4cr-3xmc-2wpm |
| VCID-qcra-cu62-43he | Cross-site Scripting In phpMyAdm, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted `database/table` name. |
CVE-2018-19970
GHSA-8987-93fh-rcwq |
| VCID-scu3-cfyc-9qfz | Cross-Site Request Forgery (CSRF) A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken `<img>` tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific `INSERT` or `DELETE` statement) to the victim. |
CVE-2019-12616
GHSA-mfr9-pcm3-6mwc |
| VCID-tks3-6uv4-kygf | phpMyAdmin SQL Injection In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges). |
CVE-2020-10804
GHSA-h65r-8fp8-w7cx |
| VCID-yfja-ssw3-skh1 | Information Exposure When the `AllowArbitraryServer` configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the `mysql.allow_local_infile` PHP configuration, and the inadvertent ignoring of `options(MYSQLI_OPT_LOCAL_INFILE` calls. |
CVE-2019-6799
GHSA-c8wj-q36q-3wg4 |
| VCID-znfm-ak2t-mqdd | phpMyAdmin SQL injection vulnerability In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. |
CVE-2020-10803
GHSA-fcww-8wvc-38q9 |
| VCID-zyzp-aqd8-e3a9 | phpMyAdmin Cross-Site Request Forgery (CSRF) A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page. |
CVE-2019-12922
GHSA-4c9q-64gq-xhx4 |