Search for vulnerabilities
Vulnerability details: VCID-yvwv-ebhn-x3g5
Vulnerability ID VCID-yvwv-ebhn-x3g5
Aliases CVE-2016-6625
GHSA-r643-7xfg-ppc5
Summary phpMyAdmin allows to detect if user is logged in An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not compromised by this vulnerability. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2016-6625
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-r643-7xfg-ppc5
cvssv3.1 4.3 https://github.com/phpmyadmin/composer
generic_textual MODERATE https://github.com/phpmyadmin/composer
cvssv3.1 4.3 https://nvd.nist.gov/vuln/detail/CVE-2016-6625
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-6625
cvssv3.1 4.3 https://security.gentoo.org/glsa/201701-32
generic_textual MODERATE https://security.gentoo.org/glsa/201701-32
cvssv3.1 4.3 https://www.phpmyadmin.net/security/PMASA-2016-48
generic_textual MODERATE https://www.phpmyadmin.net/security/PMASA-2016-48
cvssv3.1 4.3 http://www.securityfocus.com/bid/92491
generic_textual MODERATE http://www.securityfocus.com/bid/92491
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/phpmyadmin/composer
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-6625
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://security.gentoo.org/glsa/201701-32
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://www.phpmyadmin.net/security/PMASA-2016-48
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at http://www.securityfocus.com/bid/92491
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.44763
EPSS Score 0.00221
Published At Sept. 20, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:08:30.849526+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-r643-7xfg-ppc5/GHSA-r643-7xfg-ppc5.json 37.0.0