CVE-2014-7217: phpMyAdmin cross-site scripting Vulnerability via ENUM value
3.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52653%
CWE
Published
5/17/2022
Updated
8/16/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:M/Au:S/C:N/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
phpmyadmin/phpmyadmin | composer | >= 4.0.0, < 4.0.10.4 | 4.0.10.4 |
phpmyadmin/phpmyadmin | composer | >= 4.1.0, < 4.1.14.5 | 4.1.14.5 |
phpmyadmin/phpmyadmin | composer | >= 4.2.0, < 4.2.9.1 | 4.2.9.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped ENUM values in HTML output. The patches (304fb2b and c1a3f85) explicitly add htmlspecialchars()
to sanitize $properties['type'], $column_type, and $printtype in these functions. These variables contained user-controlled ENUM values, and their lack of escaping in the original code allowed XSS payloads to execute when rendered in table search/structure
pages.