Announcement-ID: PMASA-2016-14

Date: 2016-05-25

Updated: 2016-05-30


Sensitive Data in URL GET Query Parameters


Because user SQL queries are part of the URL, sensitive information made as part of a user query can be exposed by clicking on external links to attackers monitoring user GET query parameters or included in the webserver logs.

Updated to include CVE ID and added commits fixing most of problems in 4.0.10 branch.


We consider this to be non-critical.

Mitigation factor

Avoid clicking on external links in phpMyAdmin which are not redirected through url.php script.

Affected Versions

All versions prior 4.6.2 are affected.


Upgrade to phpMyAdmin 4.6.2 or newer or apply patches listed below.


This issue was found thanks to Mozilla SOS program.

Assigned CVE ids: CVE-2016-5097

CWE ids: CWE-661


The following commits have been made on the 4.6 branch to fix this issue:

The following commits have been made on the 4.0 branch to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is