Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2019-12922
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2019-12922
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-12922.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-12922
Aliases
GHSA-4c9q-64gq-xhx4
Downstream
DEBIAN-CVE-2019-12922
UBUNTU-CVE-2019-12922
USN-4843-1
openSUSE-SU-2019:2211-1
openSUSE-SU-2020:0056-1
openSUSE-SU-2024:11171-1
Related
openSUSE-SU-2019:2211-1
openSUSE-SU-2020:0056-1
openSUSE-SU-2024:11171-1
Published
2019-09-13T13:15:11Z
Modified
2025-10-13T08:12:56.217601Z
Severity
6.5 (Medium)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS Calculator
Summary
[none]
Details
A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.
References
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html
http://seclists.org/fulldisclosure/2019/Sep/23
https://github.com/phpmyadmin/phpmyadmin/commit/427fbed55d3154d96ecfc1c7784d49eaa3c04161
https://github.com/phpmyadmin/phpmyadmin/commit/7d21d4223bdbe0306593309132b4263d7087d13b
https://www.exploit-db.com/exploits/47385
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00078.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBLBE6CSC2ZLINIRBUU5XBLXYVBTF3KA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QJ5BW2VEMD2P23ZYRWHDBEQHOKGKGWD6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCB3PTGHZ7AJCM6BKCQRRP6HG3OKYCMN/
Affected packages
Git
/
github.com/phpmyadmin/phpmyadmin
Affected ranges
Type
GIT
Repo
https://github.com/phpmyadmin/phpmyadmin
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
427fbed55d3154d96ecfc1c7784d49eaa3c04161
Fixed
7d21d4223bdbe0306593309132b4263d7087d13b
Affected versions
Other
RELEASE_2_10_0
RELEASE_2_10_0RC1
RELEASE_2_10_0_1
RELEASE_2_10_0_2
RELEASE_2_10_1RC1
RELEASE_2_10_2
RELEASE_2_10_3
RELEASE_2_10_3RC1
RELEASE_2_11_0
RELEASE_2_11_0BETA1
RELEASE_2_11_0RC1
RELEASE_2_11_0RC2
RELEASE_2_11_1
RELEASE_2_11_10
RELEASE_2_11_10_1
RELEASE_2_11_11
RELEASE_2_11_11RC1
RELEASE_2_11_11_1
RELEASE_2_11_11_2
RELEASE_2_11_11_3
RELEASE_2_11_1RC1
RELEASE_2_11_1_1
RELEASE_2_11_1_2
RELEASE_2_11_2
RELEASE_2_11_2RC1
RELEASE_2_11_2_1
RELEASE_2_11_2_2
RELEASE_2_11_3
RELEASE_2_11_3RC1
RELEASE_2_11_4
RELEASE_2_11_4RC1
RELEASE_2_11_5
RELEASE_2_11_5RC1
RELEASE_2_11_5_1
RELEASE_2_11_5_2
RELEASE_2_11_6
RELEASE_2_11_6RC1
RELEASE_2_11_7
RELEASE_2_11_7RC1
RELEASE_2_11_7RC2
RELEASE_2_11_7_1
RELEASE_2_11_8
RELEASE_2_11_8RC1
RELEASE_2_11_8_1
RELEASE_2_11_9
RELEASE_2_11_9_1
RELEASE_2_11_9_2
RELEASE_2_11_9_3
RELEASE_2_11_9_4
RELEASE_2_11_9_5
RELEASE_2_11_9_6
RELEASE_2_2_0
RELEASE_2_2_1
RELEASE_2_2_2
RELEASE_2_2_3
RELEASE_2_2_4
RELEASE_2_2_5
RELEASE_2_2_6
RELEASE_2_2_7PL1
RELEASE_2_3_0
RELEASE_2_3_1
RELEASE_2_3_2
RELEASE_2_3_3PL1
RELEASE_2_4_0
RELEASE_2_5_0
RELEASE_2_5_1
RELEASE_2_5_2
RELEASE_2_5_4
RELEASE_2_5_5PL1
RELEASE_2_5_6
RELEASE_2_5_7PL1
RELEASE_2_6_1PL3
RELEASE_2_6_2PL1
RELEASE_2_6_3PL1
RELEASE_2_6_4PL4
RELEASE_2_7_0PL2
RELEASE_2_8_0_4
RELEASE_2_8_1
RELEASE_2_8_2_4
RELEASE_2_9_0
RELEASE_2_9_0_1
RELEASE_2_9_0_2
RELEASE_2_9_1_1
RELEASE_2_9_2
RELEASE_2_9_2RC1
RELEASE_3_0_0
RELEASE_3_0_0ALPHA
RELEASE_3_0_0BETA
RELEASE_3_0_0RC1
RELEASE_3_0_0RC2
RELEASE_3_0_1
RELEASE_3_0_1RC1
RELEASE_3_0_1_1
RELEASE_3_1_0
RELEASE_3_1_0BETA1
RELEASE_3_1_0RC1
RELEASE_3_1_1
RELEASE_3_1_2
RELEASE_3_1_2RC1
RELEASE_3_1_3
RELEASE_3_1_3RC1
RELEASE_3_1_3_1
RELEASE_3_1_3_2
RELEASE_3_1_4
RELEASE_3_1_4RC1
RELEASE_3_1_4RC2
RELEASE_3_1_5
RELEASE_3_1_5RC1
RELEASE_3_2_0
RELEASE_3_2_0BETA1
RELEASE_3_2_0RC1
RELEASE_3_2_0_1
RELEASE_3_2_2
RELEASE_3_2_2RC1
RELEASE_3_2_2_1
RELEASE_3_2_3
RELEASE_3_2_3RC1
RELEASE_3_2_4
RELEASE_3_2_4RC1
RELEASE_3_2_5
RELEASE_3_2_5RC1
RELEASE_3_2_5RC2
RELEASE_3_3_0
RELEASE_3_3_0ALPHA1
RELEASE_3_3_0BETA1
RELEASE_3_3_0RC1
RELEASE_3_3_0RC2
RELEASE_3_3_0RC3
RELEASE_3_3_1
RELEASE_3_3_10
RELEASE_3_3_10RC1
RELEASE_3_3_10_1
RELEASE_3_3_10_2
RELEASE_3_3_10_3
RELEASE_3_3_10_4
RELEASE_3_3_10_5
RELEASE_3_3_1RC1
RELEASE_3_3_2
RELEASE_3_3_2RC1
RELEASE_3_3_3
RELEASE_3_3_3RC1
RELEASE_3_3_4
RELEASE_3_3_4RC1
RELEASE_3_3_5
RELEASE_3_3_5RC1
RELEASE_3_3_5_1
RELEASE_3_3_6
RELEASE_3_3_6RC1
RELEASE_3_3_7
RELEASE_3_3_7RC1
RELEASE_3_3_8
RELEASE_3_3_8RC1
RELEASE_3_3_8_1
RELEASE_3_3_9
RELEASE_3_3_9RC1
RELEASE_3_3_9_1
RELEASE_3_3_9_2
RELEASE_3_4_0
RELEASE_3_4_0ALPHA1
RELEASE_3_4_0ALPHA2
RELEASE_3_4_0BETA1
RELEASE_3_4_0BETA2
RELEASE_3_4_0BETA3
RELEASE_3_4_0BETA4
RELEASE_3_4_0RC1
RELEASE_3_4_0RC2
RELEASE_3_4_1
RELEASE_3_4_10
RELEASE_3_4_10RC1
RELEASE_3_4_10_1
RELEASE_3_4_11
RELEASE_3_4_11RC1
RELEASE_3_4_11_1
RELEASE_3_4_1RC1
RELEASE_3_4_2
RELEASE_3_4_2RC1
RELEASE_3_4_3
RELEASE_3_4_3RC1
RELEASE_3_4_3_1
RELEASE_3_4_3_2
RELEASE_3_4_4
RELEASE_3_4_4RC1
RELEASE_3_4_5
RELEASE_3_4_5RC1
RELEASE_3_4_6
RELEASE_3_4_6RC1
RELEASE_3_4_7
RELEASE_3_4_7RC1
RELEASE_3_4_7_1
RELEASE_3_4_8
RELEASE_3_4_8RC1
RELEASE_3_4_9
RELEASE_3_4_9RC1
RELEASE_3_5_0
RELEASE_3_5_0ALPHA1
RELEASE_3_5_0BETA1
RELEASE_3_5_0RC1
RELEASE_3_5_0RC2
RELEASE_3_5_1
RELEASE_3_5_1RC1
RELEASE_3_5_2
RELEASE_3_5_2RC1
RELEASE_3_5_2_1
RELEASE_3_5_2_2
RELEASE_3_5_3
RELEASE_3_5_3RC1
RELEASE_3_5_4
RELEASE_3_5_4RC1
RELEASE_3_5_5RC1
RELEASE_3_5_6
RELEASE_3_5_6RC1
RELEASE_3_5_7
RELEASE_3_5_7RC1
RELEASE_3_5_8
RELEASE_3_5_8RC1
RELEASE_3_5_8_1
RELEASE_4_0_0
RELEASE_4_0_0ALPHA1
RELEASE_4_0_0ALPHA2
RELEASE_4_0_0BETA1
RELEASE_4_0_0BETA2
RELEASE_4_0_0BETA3
RELEASE_4_0_0RC1
RELEASE_4_0_0RC2
RELEASE_4_0_0RC3
RELEASE_4_0_0RC4
RELEASE_4_0_1RC1
RELEASE_4_0_2
RELEASE_4_0_2RC1
RELEASE_4_0_3
RELEASE_4_0_3RC1
RELEASE_4_0_4
RELEASE_4_0_4RC1
RELEASE_4_0_4_1
RELEASE_4_0_4_2
RELEASE_4_0_5RC1
RELEASE_4_0_6
RELEASE_4_0_6RC1
RELEASE_4_0_6RC2
RELEASE_4_1_0ALPHA1
RELEASE_4_1_0ALPHA2
RELEASE_4_1_0BETA1
RELEASE_4_1_0BETA2
RELEASE_4_1_0RC1
RELEASE_4_1_0RC2
RELEASE_4_1_0RC3
RELEASE_4_2_0
RELEASE_4_2_0ALPHA1
RELEASE_4_2_0ALPHA2
RELEASE_4_2_0BETA1
RELEASE_4_2_0RC1
RELEASE_4_2_10
RELEASE_4_2_10_1
RELEASE_4_2_11
RELEASE_4_2_12
RELEASE_4_2_13
RELEASE_4_2_13_1
RELEASE_4_2_7
RELEASE_4_2_7_1
RELEASE_4_2_8
RELEASE_4_2_8_1
RELEASE_4_2_9
RELEASE_4_2_9_1
RELEASE_4_3_0
RELEASE_4_3_0ALPHA1
RELEASE_4_3_0BETA1
RELEASE_4_3_0RC1
RELEASE_4_3_0RC2
RELEASE_4_3_1
RELEASE_4_3_10
RELEASE_4_3_11
RELEASE_4_3_11_1
RELEASE_4_3_12
RELEASE_4_3_13
RELEASE_4_3_2
RELEASE_4_3_3
RELEASE_4_3_4
RELEASE_4_3_5
RELEASE_4_3_6
RELEASE_4_3_7
RELEASE_4_3_8
RELEASE_4_3_9
RELEASE_4_4_0
RELEASE_4_4_0ALPHA1
RELEASE_4_4_1
RELEASE_4_4_10
RELEASE_4_4_11
RELEASE_4_4_12
RELEASE_4_4_13
RELEASE_4_4_13_1
RELEASE_4_4_14
RELEASE_4_4_14_1
RELEASE_4_4_15
RELEASE_4_4_15_1
RELEASE_4_4_15_2
RELEASE_4_4_1_1
RELEASE_4_4_2
RELEASE_4_4_3
RELEASE_4_4_4
RELEASE_4_4_5
RELEASE_4_4_6
RELEASE_4_4_6_1
RELEASE_4_4_7
RELEASE_4_4_8
RELEASE_4_4_9
RELEASE_4_5_0
RELEASE_4_5_0RC1
RELEASE_4_5_0_1
RELEASE_4_5_0_2
RELEASE_4_5_1
RELEASE_4_5_2
RELEASE_4_5_3
RELEASE_4_5_3_1
RELEASE_4_5_4
RELEASE_4_5_4_1
RELEASE_4_5_5
RELEASE_4_5_5_1
RELEASE_4_6_0
RELEASE_4_6_0ALPHA1
RELEASE_4_6_0RC1
RELEASE_4_6_0RC2
RELEASE_4_6_1
RELEASE_4_6_2
RELEASE_4_6_3
RELEASE_4_6_4
RELEASE_4_6_5
RELEASE_4_6_5_1
RELEASE_4_6_5_2
RELEASE_4_6_6
RELEASE_4_7_0
RELEASE_4_7_0BETA1
RELEASE_4_7_0RC1
RELEASE_4_7_1
RELEASE_4_7_2
RELEASE_4_7_3
RELEASE_4_7_4
RELEASE_4_7_5
RELEASE_4_7_6
RELEASE_4_7_7
RELEASE_4_7_8
RELEASE_4_7_9
RELEASE_4_8_0
RELEASE_4_8_0ALPHA1
RELEASE_4_8_0RC1
RELEASE_4_8_0_1
RELEASE_4_8_1
RELEASE_4_8_2
RELEASE_4_8_3
RELEASE_4_8_4
RELEASE_4_8_5
RELEASE_4_9_0
RELEASE_4_9_0_1
CVE-2019-12922 - OSV