Search for vulnerabilities
Vulnerability details: VCID-2739-kr2f-fbd8
Vulnerability ID VCID-2739-kr2f-fbd8
Aliases CVE-2016-5731
GHSA-mwm8-36c5-j5cf
Summary phpMyAdmin Cross-site scripting (XSS) vulnerability Cross-site scripting (XSS) vulnerability in examples/openid.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving an OpenID error message.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 6.1 http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
cvssv3.1 6.1 http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
epss 0.00408 https://api.first.org/data/v1/epss?cve=CVE-2016-5731
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-mwm8-36c5-j5cf
cvssv3.1 6.1 https://github.com/phpmyadmin/composer
generic_textual MODERATE https://github.com/phpmyadmin/composer
cvssv3.1 6.1 https://github.com/phpmyadmin/phpmyadmin/commit/418aeea3d83b0b6021bac311d849570acfc6e48c
generic_textual MODERATE https://github.com/phpmyadmin/phpmyadmin/commit/418aeea3d83b0b6021bac311d849570acfc6e48c
cvssv3.1 6.1 https://github.com/phpmyadmin/phpmyadmin/commit/52e7898
generic_textual MODERATE https://github.com/phpmyadmin/phpmyadmin/commit/52e7898
cvssv3.1 6.1 https://github.com/phpmyadmin/phpmyadmin/commit/5fefa51
generic_textual MODERATE https://github.com/phpmyadmin/phpmyadmin/commit/5fefa51
cvssv3.1 6.1 https://github.com/phpmyadmin/phpmyadmin/commit/78f6c54
generic_textual MODERATE https://github.com/phpmyadmin/phpmyadmin/commit/78f6c54
cvssv3.1 6.1 https://github.com/phpmyadmin/phpmyadmin/commit/94cf3864254ffaf3a69e97d8fc454888368b94ab
generic_textual MODERATE https://github.com/phpmyadmin/phpmyadmin/commit/94cf3864254ffaf3a69e97d8fc454888368b94ab
cvssv3.1 6.1 https://github.com/phpmyadmin/phpmyadmin/commit/d005ba6
generic_textual MODERATE https://github.com/phpmyadmin/phpmyadmin/commit/d005ba6
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2016-5731
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-5731
cvssv3.1 6.1 https://security.gentoo.org/glsa/201701-32
generic_textual MODERATE https://security.gentoo.org/glsa/201701-32
cvssv3.1 6.1 https://www.phpmyadmin.net/security/PMASA-2016-24
generic_textual MODERATE https://www.phpmyadmin.net/security/PMASA-2016-24
cvssv3.1 6.1 http://www.debian.org/security/2016/dsa-3627
generic_textual MODERATE http://www.debian.org/security/2016/dsa-3627
Reference id Reference type URL
http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
https://api.first.org/data/v1/epss?cve=CVE-2016-5731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5739
https://github.com/phpmyadmin/composer
https://github.com/phpmyadmin/phpmyadmin/commit/418aeea3d83b0b6021bac311d849570acfc6e48c
https://github.com/phpmyadmin/phpmyadmin/commit/52e7898
https://github.com/phpmyadmin/phpmyadmin/commit/5fefa51
https://github.com/phpmyadmin/phpmyadmin/commit/78f6c54
https://github.com/phpmyadmin/phpmyadmin/commit/94cf3864254ffaf3a69e97d8fc454888368b94ab
https://github.com/phpmyadmin/phpmyadmin/commit/d005ba6
https://nvd.nist.gov/vuln/detail/CVE-2016-5731
https://security.gentoo.org/glsa/201701-32
https://www.phpmyadmin.net/security/PMASA-2016-24
http://www.debian.org/security/2016/dsa-3627
GHSA-mwm8-36c5-j5cf https://github.com/advisories/GHSA-mwm8-36c5-j5cf
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/phpmyadmin/composer
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/phpmyadmin/phpmyadmin/commit/418aeea3d83b0b6021bac311d849570acfc6e48c
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/phpmyadmin/phpmyadmin/commit/52e7898
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/phpmyadmin/phpmyadmin/commit/5fefa51
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/phpmyadmin/phpmyadmin/commit/78f6c54
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/phpmyadmin/phpmyadmin/commit/94cf3864254ffaf3a69e97d8fc454888368b94ab
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/phpmyadmin/phpmyadmin/commit/d005ba6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-5731
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://security.gentoo.org/glsa/201701-32
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://www.phpmyadmin.net/security/PMASA-2016-24
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.debian.org/security/2016/dsa-3627
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.60375
EPSS Score 0.00408
Published At Aug. 7, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:13:43.896196+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mwm8-36c5-j5cf/GHSA-mwm8-36c5-j5cf.json 37.0.0