phpMyAdmin 5.2.2 Addresses Critical XSS and Library Vulnerabilities

phpMyAdmin 5.2.2 Addresses Critical XSS and Library Vulnerabilities

Cyble phpMyAdmin 5.2.2 Addresses Critical XSS and Library Vulnerabilities

Overview

phpMyAdmin, a popular web-based tool for managing MySQL and MariaDB databases, has recently released version 5.2.2, addressing multiple vulnerabilities that posed a medium severity risk. This widely-used tool is a basis for database administrators, offering strong features and ease of use. However, the vulnerabilities discovered could potentially expose users to risks such as unauthorized actions, session hijacking, and data theft.

The update resolves two cross-site scripting (XSS) vulnerabilities (CVE-2025-24530 and CVE-2025-24529) and a potential issue in the glibc/iconv library (CVE-2024-2961). These vulnerabilities underline the importance of staying up to date with security patches to safeguard sensitive data and ensure secure database management.

According to the advisory:

  • Reported By: The vulnerability was reported by a security researcher identified as “bluebird.”
  • Severity: Moderate.
  • Solution: Users are encouraged to upgrade to version 5.2.2 or apply the patch.

Vulnerability Details

Three significant vulnerabilities were identified in phpMyAdmin versions prior to 5.2.2:

1. CVE-2025-24530: XSS in “Check Tables”

  • Description: This XSS vulnerability allows an attacker to exploit the “Check Tables” feature by crafting a malicious table name. This could result in injecting malicious scripts into the application.
  • Impact: Successful exploitation could lead to session hijacking, data theft, and unauthorized actions.
  • CWE ID: CWE-661 (Improper Neutralization of Input During Web Page Generation).
  • Fix: This issue was resolved through commit a45efd0eb9415240480adeefc587158c766bc4a0.

2. CVE-2025-24529: XSS in “Insert”

  • Description: This vulnerability involves the “Insert” functionality, which could be manipulated to execute malicious scripts.
  • Impact: Exploitation could compromise user accounts and sensitive data by injecting malicious code into user sessions.

3. CVE-2024-2961: Vulnerability in glibc/iconv Library

  • Description: A potential issue with the glibc/iconv library could lead to arbitrary code execution under specific circumstances.
  • Impact: If exploited, this vulnerability could allow attackers to execute unauthorized code, leading to system compromise.

Affected Versions and Fixed Releases

  • Affected Versions: All phpMyAdmin 5.x versions prior to 5.2.2.
  • Fixed Versions: phpMyAdmin 5.2.2 and newer.

The vulnerabilities have been classified as medium severity, but given the potential for significant damage, users are strongly encouraged to upgrade to the latest version immediately.

Potential Impact of Exploitation

If these vulnerabilities are exploited, the consequences could include:

  • Session Hijacking: Attackers could take control of user sessions, gaining unauthorized access to sensitive data and functionalities.
  • Data Theft: Sensitive information, such as database credentials or user data, could be stolen.
  • Malicious Code Execution: Exploitation of the glibc/iconv vulnerability could allow attackers to run arbitrary code, potentially compromising the entire system.
  • Unauthorized Actions: Malicious scripts injected into the application could execute unauthorized actions, disrupting normal operations.

Recommendations for Users

To mitigate these risks, users are advised to take the following actions immediately:

  1. Upgrade to Version 5.2.2 or Later
    Ensure your phpMyAdmin installation is updated to the latest version to benefit from the security patches.
  2. Apply the Patch
    If an upgrade is not immediately possible, apply the patch provided by the phpMyAdmin team for the identified vulnerabilities.
  3. Monitor and Review Logs
    Regularly review application and server logs to detect any unusual activity that might indicate attempted exploitation.
  4. Limit Access
    Restrict access to phpMyAdmin to trusted users and IP addresses using firewall rules or .htaccess configuration.
  5. Enable Web Application Firewalls (WAFs)
    Deploy a WAF to monitor and block malicious traffic targeting known vulnerabilities.
  6. Regularly Backup Databases
    Maintain frequent backups of your databases to mitigate the risk of data loss in case of a breach.

How phpMyAdmin Addresses Security

phpMyAdmin is an open-source project that has a long-standing reputation for being reliable and secure. It provides:

  • Frequent Updates: The team regularly patches vulnerabilities, as demonstrated by the release of version 5.2.2.
  • Extensive Documentation: Detailed guidance on operations and security measures to help users safeguard their installations.
  • Community Support: phpMyAdmin has a robust community that actively reports and helps resolve security issues.
  • Multi-Language Support: The tool is translated into 72 languages, making it accessible globally.

The project is also a member of the Software Freedom Conservancy, which supports free and open-source software projects.

Why Staying Updated Matters

Database management tools like phpMyAdmin are critical components of many IT infrastructures. Security vulnerabilities in such tools can expose organizations to significant risks, especially in industries like e-commerce, healthcare, and finance, where sensitive data is handled regularly.

By promptly applying updates, organizations can:

  • Protect sensitive data.
  • Prevent unauthorized access.
  • Mitigate risks associated with zero-day vulnerabilities.

sphpMyAdmin remains a powerful tool for database management, and with continued vigilance and timely updates, users can confidently rely on it to handle their MySQL and MariaDB operations securely.

Source:

https://jocert.ncsc.jo/EN/ListDetails/Security_Alerts__Advisorites/1203/91

https://www.phpmyadmin.net/security/PMASA-2025-1

https://www.phpmyadmin.net

The post phpMyAdmin 5.2.2 Addresses Critical XSS and Library Vulnerabilities appeared first on Cyble.

Blog – Cyble – ​Read More