Skip to content

phpMyAdmin Implementation XSS Vulnerability on Server Monitor Page

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Aug 15, 2023

Package

composer phpmyadmin/phpmyadmin (Composer)

Affected versions

>= 4.0.0, < 4.0.10.5
>= 4.1.0, < 4.1.14.6
>= 4.2.0, < 4.2.10.1

Patched versions

4.0.10.5
4.1.14.6
4.2.10.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.5, 4.1.x before 4.1.14.6, and 4.2.x before 4.2.10.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) database name or (2) table name, related to the libraries/DatabaseInterface.class.php code for SQL debug output and the js/server_status_monitor.js code for the server monitor page.

References

Published by the National Vulnerability Database Nov 5, 2014
Published to the GitHub Advisory Database May 14, 2022
Reviewed Aug 15, 2023
Last updated Aug 15, 2023

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(50th percentile)

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

CVE ID

CVE-2014-8326

GHSA ID

GHSA-pvr5-84gr-g985

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.