{"id":"CVE-2016-2561","details":"Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.4.x before 4.4.15.5 and 4.5.x before 4.5.5.1 allow remote authenticated users to inject arbitrary web script or HTML via (1) normalization.php or (2) js/normalization.js in the database normalization page, (3) templates/database/structure/sortable_header.phtml in the database structure page, or (4) the pos parameter to db_central_columns.php in the central columns page.","modified":"2026-04-16T06:19:04.699425054Z","published":"2016-03-01T11:59:03.533Z","related":["openSUSE-SU-2024:10054-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-03/msg00018.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-03/msg00020.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178562.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178869.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3627"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/983faa94f161df3623ecd371d3696a1b3f91c15f"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/bcd4ce8cba1272fca52f2331c08f2e3ac19cbbef"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/cc55f44a4a90147a007dee1aefa1cb529e23798b"},{"type":"FIX","url":"https://www.phpmyadmin.net/security/PMASA-2016-12/"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/37c34d089aa19f30d11203bb0c7f85b486424372"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/746240bd13b62b5956fc34389cfbdc09e1e67775"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/f33a42f1da9db943a67bda7d29f7dd91957a8e7e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phpmyadmin/phpmyadmin","events":[{"introduced":"0"},{"last_affected":"1fe735d098d82ad79500eab04c4d25ba8fe25a24"},{"introduced":"0"},{"last_affected":"6ab95d9bec50f6be6b5439abed35f99ab3fa5cbc"},{"introduced":"0"},{"last_affected":"e4db51c0d47ac6e319ba93ce0d5706a33f736c00"},{"introduced":"0"},{"last_affected":"1c1753bb6666381fa2cd2cd1f160286935244a35"},{"introduced":"0"},{"last_affected":"d8f4a2d661f78281db7ee6826651ffc9574a2b31"},{"introduced":"0"},{"last_affected":"243ed0268fa15567c8a787eeb6055a232102b91a"},{"introduced":"0"},{"last_affected":"86a7d2704994c43a4fae11cf38105fc3cb3d4d5b"},{"introduced":"0"},{"last_affected":"dba2af651a53d5037296a1dc827081a94ef1062c"},{"introduced":"0"},{"last_affected":"409c9bc50aa447c52d334c839f4aa239f66c5e03"},{"introduced":"0"},{"last_affected":"a62fcf03af4c7f9df2393fbe58ae8653166763fa"},{"introduced":"0"},{"last_affected":"b478a3d5c4fc1341a0a77235d2afbd2b4e4d0a6c"},{"introduced":"0"},{"last_affected":"5b0543da6915bac44cb15e7e73f9e1886fe57588"},{"introduced":"0"},{"last_affected":"a1b4ecc69bc4ac90a54e3f3c8644ca18f13b010d"},{"introduced":"0"},{"last_affected":"b0d60e271a6f47d2e0ecd81ad620b5d185acc0b1"},{"introduced":"0"},{"last_affected":"426c5d9c1ded024c9306428ce165ae82d6f6d5df"},{"introduced":"0"},{"last_affected":"78a6214afcee3a6b65eb5e1ac261aa8e70f36736"},{"introduced":"0"},{"last_affected":"95104ff56e15876c6b481e09c9f0169e34b781f8"},{"introduced":"0"},{"last_affected":"5b2b959a40ddd728d5ef4c6b09f118038c5e8af0"},{"introduced":"0"},{"last_affected":"f7f483e99a74648843cc87265033442aeb4b7342"},{"introduced":"0"},{"last_affected":"3fc737460caa3c47d9d51751d712cc8784b1dfef"},{"introduced":"0"},{"last_affected":"fecf8b76ef831be0a5a8fddb1c3edf4251e92076"},{"introduced":"0"},{"last_affected":"daf86cd1e369f63ad132d8dc63a7217267030408"},{"introduced":"0"},{"last_affected":"c21937440af0b0b2ed752f229c3d2523ac178d85"},{"introduced":"0"},{"last_affected":"32f512698518214fcc59ea45e0f35b0aedff16cb"},{"introduced":"0"},{"last_affected":"796e6ae09301a7ea8aae74fdb3bb44538c0f5151"},{"introduced":"0"},{"last_affected":"7ab576930ba6cd844c3bbffa6161b8b4669b969c"},{"introduced":"0"},{"last_affected":"9e08133f49f0b99868fec434762366d08a45b6f8"},{"introduced":"0"},{"last_affected":"ae7d3bb97a30805f98945fd4a442d023ae0ea24a"},{"introduced":"0"},{"last_affected":"b900c917101a15c78666579a28bab19b95bef669"},{"introduced":"0"},{"last_affected":"1ec51857f828c2d409ad76450695ca281ed89fc3"},{"introduced":"0"},{"last_affected":"a81ac373c82ec81351b3e5a30c5aa0b2b9e444af"},{"introduced":"0"},{"last_affected":"d89a6bda4c6de1bac301f737e290ae376c15be56"},{"introduced":"0"},{"last_affected":"2870a797f366589d89bc23c6cf29681f17ce3a89"},{"introduced":"0"},{"last_affected":"1cb223f320dbf29fd4ae00a21f5d6bb2e3f43524"},{"introduced":"0"},{"last_affected":"4b3c91b0f5c19afec21a909f80bd4fd0e0a056dc"},{"fixed":"37c34d089aa19f30d11203bb0c7f85b486424372"},{"fixed":"746240bd13b62b5956fc34389cfbdc09e1e67775"},{"fixed":"983faa94f161df3623ecd371d3696a1b3f91c15f"},{"fixed":"bcd4ce8cba1272fca52f2331c08f2e3ac19cbbef"},{"fixed":"cc55f44a4a90147a007dee1aefa1cb529e23798b"},{"fixed":"f33a42f1da9db943a67bda7d29f7dd91957a8e7e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.4.0"},{"introduced":"0"},{"last_affected":"4.4.1"},{"introduced":"0"},{"last_affected":"4.4.1.1"},{"introduced":"0"},{"last_affected":"4.4.2"},{"introduced":"0"},{"last_affected":"4.4.3"},{"introduced":"0"},{"last_affected":"4.4.4"},{"introduced":"0"},{"last_affected":"4.4.5"},{"introduced":"0"},{"last_affected":"4.4.6"},{"introduced":"0"},{"last_affected":"4.4.6.1"},{"introduced":"0"},{"last_affected":"4.4.7"},{"introduced":"0"},{"last_affected":"4.4.8"},{"introduced":"0"},{"last_affected":"4.4.9"},{"introduced":"0"},{"last_affected":"4.4.10"},{"introduced":"0"},{"last_affected":"4.4.11"},{"introduced":"0"},{"last_affected":"4.4.12"},{"introduced":"0"},{"last_affected":"4.4.13"},{"introduced":"0"},{"last_affected":"4.4.13.1"},{"introduced":"0"},{"last_affected":"4.4.14"},{"introduced":"0"},{"last_affected":"4.4.14.1"},{"introduced":"0"},{"last_affected":"4.4.15"},{"introduced":"0"},{"last_affected":"4.4.15.1"},{"introduced":"0"},{"last_affected":"4.4.15.2"},{"introduced":"0"},{"last_affected":"4.4.15.3"},{"introduced":"0"},{"last_affected":"4.4.15.4"},{"introduced":"0"},{"last_affected":"4.5.0"},{"introduced":"0"},{"last_affected":"4.5.0-rc1"},{"introduced":"0"},{"last_affected":"4.5.0.1"},{"introduced":"0"},{"last_affected":"4.5.0.2"},{"introduced":"0"},{"last_affected":"4.5.1"},{"introduced":"0"},{"last_affected":"4.5.2"},{"introduced":"0"},{"last_affected":"4.5.3"},{"introduced":"0"},{"last_affected":"4.5.3.1"},{"introduced":"0"},{"last_affected":"4.5.4"},{"introduced":"0"},{"last_affected":"4.5.4.1"},{"introduced":"0"},{"last_affected":"4.5.5"}]}}],"versions":["RELEASE_2_2_0","RELEASE_2_2_1","RELEASE_2_2_2","RELEASE_2_2_3","RELEASE_2_2_4","RELEASE_2_2_5","RELEASE_2_2_6","RELEASE_2_2_7PL1","RELEASE_2_3_0","RELEASE_2_3_1","RELEASE_2_3_2","RELEASE_2_3_3PL1","RELEASE_2_4_0","RELEASE_2_5_0","RELEASE_2_5_1","RELEASE_2_5_2","RELEASE_2_5_4","RELEASE_2_5_5PL1","RELEASE_2_5_6","RELEASE_2_5_7PL1","RELEASE_2_6_1PL3","RELEASE_2_6_2PL1","RELEASE_2_6_3PL1","RELEASE_2_6_4PL4","RELEASE_2_7_0PL2","RELEASE_2_8_0_4","RELEASE_2_8_1","RELEASE_2_8_2_4","RELEASE_2_9_0","RELEASE_3_4_0RC2","RELEASE_3_5_0ALPHA1","RELEASE_4_0_0ALPHA2","RELEASE_4_0_0BETA3","RELEASE_4_0_0RC1","RELEASE_4_1_0ALPHA1","RELEASE_4_1_0BETA1","RELEASE_4_1_0BETA2","RELEASE_4_2_0ALPHA2","RELEASE_4_2_0BETA1","RELEASE_4_4_0","RELEASE_4_4_0ALPHA1","RELEASE_4_4_1","RELEASE_4_4_10","RELEASE_4_4_11","RELEASE_4_4_12","RELEASE_4_4_13","RELEASE_4_4_13_1","RELEASE_4_4_14","RELEASE_4_4_14_1","RELEASE_4_4_15","RELEASE_4_4_15_1","RELEASE_4_4_15_2","RELEASE_4_4_15_3","RELEASE_4_4_15_4","RELEASE_4_4_1_1","RELEASE_4_4_2","RELEASE_4_4_3","RELEASE_4_4_4","RELEASE_4_4_5","RELEASE_4_4_6","RELEASE_4_4_6_1","RELEASE_4_4_7","RELEASE_4_4_8","RELEASE_4_4_9","RELEASE_4_5_0","RELEASE_4_5_0RC1","RELEASE_4_5_0_1","RELEASE_4_5_0_2","RELEASE_4_5_1","RELEASE_4_5_2","RELEASE_4_5_3","RELEASE_4_5_3_1","RELEASE_4_5_4","RELEASE_4_5_4_1","RELEASE_4_5_5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.5.0-beta1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.5.0-beta2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2561.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}