Bored of official project news? Then check out developers blogs at planet phpMyAdmin.

You can also follow us on Facebook or Twitter. The news are also available in a RSS feed.

phpMyAdmin Wiki


You are invited to visit and update brand new phpMyAdmin wiki which
currently contains up to date documentation and various information
about phpMyAdmin. Share your hits which might be useful for other
users! Wiki can be found at

phpMyAdmin 2.9.0-beta1 is released


Welcome to the first beta for 2.9.0. See the release notes on for the list of improvements.

phpMyAdmin is released


Sorry, broke the setup script; fixed in

phpMyAdmin is released


Two fixes:

- cookie login on IIS with IE6
- switching from scripts/setup.php to the main script in case of register_globals enabled

phpMyAdmin is released


This release fixes another case where the newly created configuration file was not used. See our bug tracker for the description of the problem.

phpMyAdmin is released


Here are a few fixes for 2.8.2 while 2.9.0 is cookin'. See the release notes for details.

List of winners for books


Packt Publishing has made available the list of winners for the Mastering phpMyAdmin book competition:

Congratulations to all and enjoy the reading!

Win phpMyAdmin's official book!


Starting Monday July 17 until Friday July 21, win the book "Mastering phpMyAdmin for Effective MySQL Management". Ten copies to win!
Details at

phpMyAdmin 2.8.2 is released


phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the Web. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields.

Welcome to version 2.8.2 which fixes an XSS vulnerability and a few bugs. Our documentation now officially states that your browser must accept cookies for normal operation with phpMyAdmin.

You can download this release at:

phpMyAdmin 2.8.1 is released


Welcome to version 2.8.1, which is a bugfix-only release for the 2.8 family. It also fixes a new vulnerability, see the upcoming security alert PMASA-2006-3 at