Search for vulnerabilities
Vulnerability details: VCID-qhn7-b1w4-vkfn
Vulnerability ID VCID-qhn7-b1w4-vkfn
Aliases CVE-2016-5739
GHSA-2p7v-jm8m-g3qq
Summary phpMyAdmin vulnerable to Cross-Site Request Forgery The Transformation implementation in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not use the no-referrer Content Security Policy (CSP) protection mechanism, which makes it easier for remote attackers to conduct CSRF attacks by reading an authentication token in a Referer header, related to libraries/Header.php.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
generic_textual HIGH http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
generic_textual HIGH http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
epss 0.00901 https://api.first.org/data/v1/epss?cve=CVE-2016-5739
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-2p7v-jm8m-g3qq
cvssv3.1 7.5 https://github.com/phpmyadmin/phpmyadmin
generic_textual HIGH https://github.com/phpmyadmin/phpmyadmin
cvssv3.1 7.5 https://github.com/phpmyadmin/phpmyadmin/commit/1e5716cb96d46efc305381ae0da08e73fe340f05
generic_textual HIGH https://github.com/phpmyadmin/phpmyadmin/commit/1e5716cb96d46efc305381ae0da08e73fe340f05
cvssv3.1 7.5 https://github.com/phpmyadmin/phpmyadmin/commit/2f4950828ec241e8cbdcf13090c2582a6fa620cb
generic_textual HIGH https://github.com/phpmyadmin/phpmyadmin/commit/2f4950828ec241e8cbdcf13090c2582a6fa620cb
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2016-5739
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2016-5739
cvssv3.1 7.5 https://security.gentoo.org/glsa/201701-32
generic_textual HIGH https://security.gentoo.org/glsa/201701-32
cvssv3.1 7.5 https://web.archive.org/web/20200227223419/http://www.securityfocus.com/bid/91389
generic_textual HIGH https://web.archive.org/web/20200227223419/http://www.securityfocus.com/bid/91389
cvssv3.1 7.5 https://www.phpmyadmin.net/security/PMASA-2016-28
generic_textual HIGH https://www.phpmyadmin.net/security/PMASA-2016-28
cvssv3.1 7.5 http://www.debian.org/security/2016/dsa-3627
generic_textual HIGH http://www.debian.org/security/2016/dsa-3627
Reference id Reference type URL
http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
https://api.first.org/data/v1/epss?cve=CVE-2016-5739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5739
https://github.com/phpmyadmin/phpmyadmin
https://github.com/phpmyadmin/phpmyadmin/commit/1e5716cb96d46efc305381ae0da08e73fe340f05
https://github.com/phpmyadmin/phpmyadmin/commit/2f4950828ec241e8cbdcf13090c2582a6fa620cb
https://nvd.nist.gov/vuln/detail/CVE-2016-5739
https://security.gentoo.org/glsa/201701-32
https://web.archive.org/web/20200227223419/http://www.securityfocus.com/bid/91389
https://www.phpmyadmin.net/security/PMASA-2016-28
http://www.debian.org/security/2016/dsa-3627
GHSA-2p7v-jm8m-g3qq https://github.com/advisories/GHSA-2p7v-jm8m-g3qq
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/phpmyadmin/phpmyadmin
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/phpmyadmin/phpmyadmin/commit/1e5716cb96d46efc305381ae0da08e73fe340f05
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/phpmyadmin/phpmyadmin/commit/2f4950828ec241e8cbdcf13090c2582a6fa620cb
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-5739
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://security.gentoo.org/glsa/201701-32
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://web.archive.org/web/20200227223419/http://www.securityfocus.com/bid/91389
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.phpmyadmin.net/security/PMASA-2016-28
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at http://www.debian.org/security/2016/dsa-3627
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.7473
EPSS Score 0.00901
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:08:12.924283+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-2p7v-jm8m-g3qq/GHSA-2p7v-jm8m-g3qq.json 37.0.0