-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| phpmyadmin/phpmyadmin | composer | >= 4.6, < 4.6.5 | 4.6.5 |
| phpmyadmin/phpmyadmin | composer | >= 4.4, < 4.4.15.9 | 4.4.15.9 |
| phpmyadmin/phpmyadmin | composer | >= 4.0, < 4.0.10.18 | 4.0.10.18 |
The vulnerability stemmed from inadequate regex patterns in JavaScript escaping functions. The security advisory explicitly lists commits modifying regex handling in JS processing utilities across multiple branches. These functions are directly responsible for sanitizing user input before inclusion in JavaScript contexts. The XSS would occur when unproperly sanitized data is output via these functions, making them the primary vulnerable entry points visible in runtime traces during exploitation.
A Semantic Attack on Google Gemini - Read the Latest Research