5 XSS vulnerabilities in setup, chart display, process list, and logo link.
untrusted JS code could be executed.
In the Display chart view, a chart title containing HTML code
execution via events.
A malicious user with permission to create databases or users
having HTML tags in their name, could trigger an XSS vulnerability by
issuing a sleep query with a long delay. In the server status
monitor, the query parameters were shown unescaped.
By configuring a malicious URL for the phpMyAdmin logo link in the
navigation sidebar, untrusted script code could be executed when
a user clicked the logo.
The setup field for "List of trusted proxies for IP allow/deny"
Ajax validation code returned the unescaped input on errors,
We consider these vulnerabilities to be non critical.
The stored XSS vulnerabilities can be triggered only by someone who logged in to phpMyAdmin,
as the usual token protection prevents non-logged-in users from accessing the required forms.
The setup vulnerabilities can only be triggered when a crafted value is entered by the user.
Versions 3.5.x (prior to 188.8.131.52) and 4.0.x (prior to 184.108.40.206) are affected.
Upgrade to phpMyAdmin 220.127.116.11 or 18.104.22.168 or newer or apply the patches
Thanks to Emanuel Bronshtein for reporting these issues.
Assigned CVE ids:
The following commits have been made to fix this issue:
The following commits have been made on the 3.5 branch to fix this issue:
For further information and in case of questions, please contact the
phpMyAdmin team. Our website is