-
CVSS Score
-The vulnerability stems from unescaped output of the pageNumber parameter in schema export generation. The security advisory explicitly identifies Export_Relation_Schema.class.php as the vulnerable component, and the patch commits indicate escaping was added to HTML output handling. The main exportSchema method would be responsible for coordinating the export output generation where the pageNumber parameter would be incorporated into the final HTML without proper escaping in vulnerable versions. This matches the XSS pattern of missing output encoding in web page generation functions.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| phpmyadmin/phpmyadmin | composer | >= 3.5, < 3.5.8.2 | 3.5.8.2 |
| phpmyadmin/phpmyadmin | composer | >= 4.0, < 4.0.4.2 | 4.0.4.2 |
A Semantic Attack on Google Gemini - Read the Latest Research