{"id":"CVE-2016-5732","details":"Multiple cross-site scripting (XSS) vulnerabilities in the partition-range implementation in templates/table/structure/display_partitions.phtml in the table-structure page in phpMyAdmin 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via crafted table parameters.","aliases":["GHSA-3q28-xfw3-2q35"],"modified":"2026-04-10T03:51:54.094171Z","published":"2016-07-03T01:59:22.627Z","related":["openSUSE-SU-2024:10054-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-32"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/0815af37f483f329f0c0565d68821fea9c47b5f5"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/792cd1262f012b9b13639519d414f2acaeb5e972"},{"type":"FIX","url":"https://www.phpmyadmin.net/security/PMASA-2016-25/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phpmyadmin/phpmyadmin","events":[{"introduced":"0"},{"last_affected":"37b38431d167915675fc8ab512470528147e72de"},{"introduced":"0"},{"last_affected":"a6ecc52b3d1245a30d270d871992f2fedcf84be6"},{"introduced":"0"},{"last_affected":"73fd0dc2a8f5471c717a887aae22bde97bc5498f"},{"introduced":"0"},{"last_affected":"0fc00c0ab895cf83883ce43435f9563019e1b0f5"},{"introduced":"0"},{"last_affected":"07fd0bce678e83d5f81d7a683f1052fe45764d0c"},{"introduced":"0"},{"last_affected":"35e191d74b50c8f5a7b87fa9889869cc3a88255d"},{"fixed":"0815af37f483f329f0c0565d68821fea9c47b5f5"},{"fixed":"792cd1262f012b9b13639519d414f2acaeb5e972"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.6.0"},{"introduced":"0"},{"last_affected":"4.6.0-alpha1"},{"introduced":"0"},{"last_affected":"4.6.0-rc1"},{"introduced":"0"},{"last_affected":"4.6.0-rc2"},{"introduced":"0"},{"last_affected":"4.6.1"},{"introduced":"0"},{"last_affected":"4.6.2"}]}}],"versions":["RELEASE_2_2_0","RELEASE_2_2_1","RELEASE_2_2_2","RELEASE_2_2_3","RELEASE_2_2_4","RELEASE_2_2_5","RELEASE_2_2_6","RELEASE_2_2_7PL1","RELEASE_2_3_0","RELEASE_2_3_1","RELEASE_2_3_2","RELEASE_2_3_3PL1","RELEASE_2_4_0","RELEASE_2_5_0","RELEASE_2_5_1","RELEASE_2_5_2","RELEASE_2_5_4","RELEASE_2_5_5PL1","RELEASE_2_5_6","RELEASE_2_5_7PL1","RELEASE_2_6_1PL3","RELEASE_2_6_2PL1","RELEASE_2_6_3PL1","RELEASE_2_6_4PL4","RELEASE_2_7_0PL2","RELEASE_2_8_0_4","RELEASE_2_8_1","RELEASE_2_8_2_4","RELEASE_2_9_0","RELEASE_3_4_0RC2","RELEASE_3_5_0ALPHA1","RELEASE_4_0_0ALPHA2","RELEASE_4_0_0BETA3","RELEASE_4_0_0RC1","RELEASE_4_1_0ALPHA1","RELEASE_4_1_0BETA1","RELEASE_4_1_0BETA2","RELEASE_4_2_0ALPHA2","RELEASE_4_2_0BETA1","RELEASE_4_6_0","RELEASE_4_6_0ALPHA1","RELEASE_4_6_0RC1","RELEASE_4_6_0RC2","RELEASE_4_6_1","RELEASE_4_6_2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5732.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}