{"id":"CVE-2019-12922","details":"A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.","aliases":["GHSA-4c9q-64gq-xhx4"],"modified":"2026-04-02T01:23:38.370901Z","published":"2019-09-13T13:15:11.323Z","related":["openSUSE-SU-2019:2211-1","openSUSE-SU-2020:0056-1","openSUSE-SU-2024:11171-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBLBE6CSC2ZLINIRBUU5XBLXYVBTF3KA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QJ5BW2VEMD2P23ZYRWHDBEQHOKGKGWD6/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCB3PTGHZ7AJCM6BKCQRRP6HG3OKYCMN/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00078.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/427fbed55d3154d96ecfc1c7784d49eaa3c04161"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/7d21d4223bdbe0306593309132b4263d7087d13b"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/47385"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2019/Sep/23"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phpmyadmin/phpmyadmin","events":[{"introduced":"0"},{"last_affected":"c60a750764b8a4b927b15e03640908ef751089d7"},{"fixed":"427fbed55d3154d96ecfc1c7784d49eaa3c04161"},{"fixed":"7d21d4223bdbe0306593309132b4263d7087d13b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.9.0.1"}]}}],"versions":["RELEASE_2_10_0","RELEASE_2_10_0RC1","RELEASE_2_10_0_1","RELEASE_2_10_0_2","RELEASE_2_10_1RC1","RELEASE_2_10_2","RELEASE_2_10_3","RELEASE_2_10_3RC1","RELEASE_2_11_0","RELEASE_2_11_0BETA1","RELEASE_2_11_0RC1","RELEASE_2_11_0RC2","RELEASE_2_11_1","RELEASE_2_11_10","RELEASE_2_11_10_1","RELEASE_2_11_11","RELEASE_2_11_11RC1","RELEASE_2_11_11_1","RELEASE_2_11_11_2","RELEASE_2_11_11_3","RELEASE_2_11_1RC1","RELEASE_2_11_1_1","RELEASE_2_11_1_2","RELEASE_2_11_2","RELEASE_2_11_2RC1","RELEASE_2_11_2_1","RELEASE_2_11_2_2","RELEASE_2_11_3","RELEASE_2_11_3RC1","RELEASE_2_11_4","RELEASE_2_11_4RC1","RELEASE_2_11_5","RELEASE_2_11_5RC1","RELEASE_2_11_5_1","RELEASE_2_11_5_2","RELEASE_2_11_6","RELEASE_2_11_6RC1","RELEASE_2_11_7","RELEASE_2_11_7RC1","RELEASE_2_11_7RC2","RELEASE_2_11_7_1","RELEASE_2_11_8","RELEASE_2_11_8RC1","RELEASE_2_11_8_1","RELEASE_2_11_9","RELEASE_2_11_9_1","RELEASE_2_11_9_2","RELEASE_2_11_9_3","RELEASE_2_11_9_4","RELEASE_2_11_9_5","RELEASE_2_11_9_6","RELEASE_2_2_0","RELEASE_2_2_1","RELEASE_2_2_2","RELEASE_2_2_3","RELEASE_2_2_4","RELEASE_2_2_5","RELEASE_2_2_6","RELEASE_2_2_7PL1","RELEASE_2_3_0","RELEASE_2_3_1","RELEASE_2_3_2","RELEASE_2_3_3PL1","RELEASE_2_4_0","RELEASE_2_5_0","RELEASE_2_5_1","RELEASE_2_5_2","RELEASE_2_5_4","RELEASE_2_5_5PL1","RELEASE_2_5_6","RELEASE_2_5_7PL1","RELEASE_2_6_1PL3","RELEASE_2_6_2PL1","RELEASE_2_6_3PL1","RELEASE_2_6_4PL4","RELEASE_2_7_0PL2","RELEASE_2_8_0_4","RELEASE_2_8_1","RELEASE_2_8_2_4","RELEASE_2_9_0","RELEASE_2_9_0_1","RELEASE_2_9_0_2","RELEASE_2_9_1_1","RELEASE_2_9_2","RELEASE_2_9_2RC1","RELEASE_3_0_0","RELEASE_3_0_0ALPHA","RELEASE_3_0_0BETA","RELEASE_3_0_0RC1","RELEASE_3_0_0RC2","RELEASE_3_0_1","RELEASE_3_0_1RC1","RELEASE_3_0_1_1","RELEASE_3_1_0","RELEASE_3_1_0BETA1","RELEASE_3_1_0RC1","RELEASE_3_1_1","RELEASE_3_1_2","RELEASE_3_1_2RC1","RELEASE_3_1_3","RELEASE_3_1_3RC1","RELEASE_3_1_3_1","RELEASE_3_1_3_2","RELEASE_3_1_4","RELEASE_3_1_4RC1","RELEASE_3_1_4RC2","RELEASE_3_1_5","RELEASE_3_1_5RC1","RELEASE_3_2_0","RELEASE_3_2_0BETA1","RELEASE_3_2_0RC1","RELEASE_3_2_0_1","RELEASE_3_2_2","RELEASE_3_2_2RC1","RELEASE_3_2_2_1","RELEASE_3_2_3","RELEASE_3_2_3RC1","RELEASE_3_2_4","RELEASE_3_2_4RC1","RELEASE_3_2_5","RELEASE_3_2_5RC1","RELEASE_3_2_5RC2","RELEASE_3_3_0","RELEASE_3_3_0ALPHA1","RELEASE_3_3_0BETA1","RELEASE_3_3_0RC1","RELEASE_3_3_0RC2","RELEASE_3_3_0RC3","RELEASE_3_3_1","RELEASE_3_3_10","RELEASE_3_3_10RC1","RELEASE_3_3_10_1","RELEASE_3_3_10_2","RELEASE_3_3_10_3","RELEASE_3_3_10_4","RELEASE_3_3_10_5","RELEASE_3_3_1RC1","RELEASE_3_3_2","RELEASE_3_3_2RC1","RELEASE_3_3_3","RELEASE_3_3_3RC1","RELEASE_3_3_4","RELEASE_3_3_4RC1","RELEASE_3_3_5","RELEASE_3_3_5RC1","RELEASE_3_3_5_1","RELEASE_3_3_6","RELEASE_3_3_6RC1","RELEASE_3_3_7","RELEASE_3_3_7RC1","RELEASE_3_3_8","RELEASE_3_3_8RC1","RELEASE_3_3_8_1","RELEASE_3_3_9","RELEASE_3_3_9RC1","RELEASE_3_3_9_1","RELEASE_3_3_9_2","RELEASE_3_4_0","RELEASE_3_4_0ALPHA1","RELEASE_3_4_0ALPHA2","RELEASE_3_4_0BETA1","RELEASE_3_4_0BETA2","RELEASE_3_4_0BETA3","RELEASE_3_4_0BETA4","RELEASE_3_4_0RC1","RELEASE_3_4_0RC2","RELEASE_3_4_1","RELEASE_3_4_10","RELEASE_3_4_10RC1","RELEASE_3_4_10_1","RELEASE_3_4_10_2","RELEASE_3_4_11","RELEASE_3_4_11RC1","RELEASE_3_4_11_1","RELEASE_3_4_1RC1","RELEASE_3_4_2","RELEASE_3_4_2RC1","RELEASE_3_4_3","RELEASE_3_4_3RC1","RELEASE_3_4_3_1","RELEASE_3_4_3_2","RELEASE_3_4_4","RELEASE_3_4_4RC1","RELEASE_3_4_5","RELEASE_3_4_5RC1","RELEASE_3_4_6","RELEASE_3_4_6RC1","RELEASE_3_4_7","RELEASE_3_4_7RC1","RELEASE_3_4_7_1","RELEASE_3_4_8","RELEASE_3_4_8RC1","RELEASE_3_4_9","RELEASE_3_4_9RC1","RELEASE_3_5_0","RELEASE_3_5_0ALPHA1","RELEASE_3_5_0BETA1","RELEASE_3_5_0RC1","RELEASE_3_5_0RC2","RELEASE_3_5_1","RELEASE_3_5_1RC1","RELEASE_3_5_2","RELEASE_3_5_2RC1","RELEASE_3_5_2_1","RELEASE_3_5_2_2","RELEASE_3_5_3","RELEASE_3_5_3RC1","RELEASE_3_5_4","RELEASE_3_5_4RC1","RELEASE_3_5_5","RELEASE_3_5_5RC1","RELEASE_3_5_6","RELEASE_3_5_6RC1","RELEASE_3_5_7","RELEASE_3_5_7RC1","RELEASE_3_5_8","RELEASE_3_5_8RC1","RELEASE_3_5_8_1","RELEASE_3_5_8_2","RELEASE_4_0_0","RELEASE_4_0_0ALPHA1","RELEASE_4_0_0ALPHA2","RELEASE_4_0_0BETA1","RELEASE_4_0_0BETA2","RELEASE_4_0_0BETA3","RELEASE_4_0_0RC1","RELEASE_4_0_0RC2","RELEASE_4_0_0RC3","RELEASE_4_0_0RC4","RELEASE_4_0_1","RELEASE_4_0_10","RELEASE_4_0_10_1","RELEASE_4_0_10_10","RELEASE_4_0_10_11","RELEASE_4_0_10_12","RELEASE_4_0_10_13","RELEASE_4_0_10_14","RELEASE_4_0_10_15","RELEASE_4_0_10_16","RELEASE_4_0_10_17","RELEASE_4_0_10_18","RELEASE_4_0_10_19","RELEASE_4_0_10_2","RELEASE_4_0_10_20","RELEASE_4_0_10_3","RELEASE_4_0_10_4","RELEASE_4_0_10_5","RELEASE_4_0_10_6","RELEASE_4_0_10_7","RELEASE_4_0_10_8","RELEASE_4_0_10_9","RELEASE_4_0_1RC1","RELEASE_4_0_2","RELEASE_4_0_2RC1","RELEASE_4_0_3","RELEASE_4_0_3RC1","RELEASE_4_0_4","RELEASE_4_0_4RC1","RELEASE_4_0_4_1","RELEASE_4_0_4_2","RELEASE_4_0_5","RELEASE_4_0_5RC1","RELEASE_4_0_5RC2","RELEASE_4_0_6","RELEASE_4_0_6RC1","RELEASE_4_0_6RC2","RELEASE_4_0_7","RELEASE_4_0_7RC1","RELEASE_4_0_8","RELEASE_4_0_8RC1","RELEASE_4_0_9","RELEASE_4_0_9RC1","RELEASE_4_1_0","RELEASE_4_1_0ALPHA1","RELEASE_4_1_0ALPHA2","RELEASE_4_1_0BETA1","RELEASE_4_1_0BETA2","RELEASE_4_1_0RC1","RELEASE_4_1_0RC2","RELEASE_4_1_0RC3","RELEASE_4_1_1","RELEASE_4_1_10","RELEASE_4_1_11","RELEASE_4_1_12","RELEASE_4_1_13","RELEASE_4_1_14","RELEASE_4_1_14_1","RELEASE_4_1_14_2","RELEASE_4_1_14_3","RELEASE_4_1_14_4","RELEASE_4_1_14_5","RELEASE_4_1_14_6","RELEASE_4_1_14_7","RELEASE_4_1_14_8","RELEASE_4_1_2","RELEASE_4_1_3","RELEASE_4_1_4","RELEASE_4_1_5","RELEASE_4_1_6","RELEASE_4_1_7","RELEASE_4_1_8","RELEASE_4_1_9","RELEASE_4_2_0","RELEASE_4_2_0ALPHA1","RELEASE_4_2_0ALPHA2","RELEASE_4_2_0BETA1","RELEASE_4_2_0RC1","RELEASE_4_2_1","RELEASE_4_2_10","RELEASE_4_2_10_1","RELEASE_4_2_11","RELEASE_4_2_12","RELEASE_4_2_13","RELEASE_4_2_13_1","RELEASE_4_2_13_2","RELEASE_4_2_13_3","RELEASE_4_2_2","RELEASE_4_2_3","RELEASE_4_2_4","RELEASE_4_2_5","RELEASE_4_2_6","RELEASE_4_2_7","RELEASE_4_2_7_1","RELEASE_4_2_8","RELEASE_4_2_8_1","RELEASE_4_2_9","RELEASE_4_2_9_1","RELEASE_4_3_0","RELEASE_4_3_0ALPHA1","RELEASE_4_3_0BETA1","RELEASE_4_3_0RC1","RELEASE_4_3_0RC2","RELEASE_4_3_1","RELEASE_4_3_10","RELEASE_4_3_11","RELEASE_4_3_11_1","RELEASE_4_3_12","RELEASE_4_3_13","RELEASE_4_3_13_1","RELEASE_4_3_13_2","RELEASE_4_3_13_3","RELEASE_4_3_2","RELEASE_4_3_3","RELEASE_4_3_4","RELEASE_4_3_5","RELEASE_4_3_6","RELEASE_4_3_7","RELEASE_4_3_8","RELEASE_4_3_9","RELEASE_4_4_0","RELEASE_4_4_0ALPHA1","RELEASE_4_4_1","RELEASE_4_4_10","RELEASE_4_4_11","RELEASE_4_4_12","RELEASE_4_4_13","RELEASE_4_4_13_1","RELEASE_4_4_14","RELEASE_4_4_14_1","RELEASE_4_4_15","RELEASE_4_4_15_1","RELEASE_4_4_15_10","RELEASE_4_4_15_2","RELEASE_4_4_15_3","RELEASE_4_4_15_4","RELEASE_4_4_15_5","RELEASE_4_4_15_6","RELEASE_4_4_15_7","RELEASE_4_4_15_8","RELEASE_4_4_15_9","RELEASE_4_4_1_1","RELEASE_4_4_2","RELEASE_4_4_3","RELEASE_4_4_4","RELEASE_4_4_5","RELEASE_4_4_6","RELEASE_4_4_6_1","RELEASE_4_4_7","RELEASE_4_4_8","RELEASE_4_4_9","RELEASE_4_5_0","RELEASE_4_5_0RC1","RELEASE_4_5_0_1","RELEASE_4_5_0_2","RELEASE_4_5_1","RELEASE_4_5_2","RELEASE_4_5_3","RELEASE_4_5_3_1","RELEASE_4_5_4","RELEASE_4_5_4_1","RELEASE_4_5_5","RELEASE_4_5_5_1","RELEASE_4_6_0","RELEASE_4_6_0ALPHA1","RELEASE_4_6_0RC1","RELEASE_4_6_0RC2","RELEASE_4_6_1","RELEASE_4_6_2","RELEASE_4_6_3","RELEASE_4_6_4","RELEASE_4_6_5","RELEASE_4_6_5_1","RELEASE_4_6_5_2","RELEASE_4_6_6","RELEASE_4_7_0","RELEASE_4_7_0BETA1","RELEASE_4_7_0RC1","RELEASE_4_7_1","RELEASE_4_7_2","RELEASE_4_7_3","RELEASE_4_7_4","RELEASE_4_7_5","RELEASE_4_7_6","RELEASE_4_7_7","RELEASE_4_7_8","RELEASE_4_7_9","RELEASE_4_8_0","RELEASE_4_8_0ALPHA1","RELEASE_4_8_0RC1","RELEASE_4_8_0_1","RELEASE_4_8_1","RELEASE_4_8_2","RELEASE_4_8_3","RELEASE_4_8_4","RELEASE_4_8_5","RELEASE_4_9_0","RELEASE_4_9_0_1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-12922.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}