Low severityNVD Advisory· Published Jul 20, 2014· Updated May 6, 2026
CVE-2014-4986
CVE-2014-4986
Description
Multiple cross-site scripting (XSS) vulnerabilities in js/functions.js in phpMyAdmin 4.0.x before 4.0.10.1, 4.1.x before 4.1.14.2, and 4.2.x before 4.2.6 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) table name or (2) column name that is improperly handled during construction of an AJAX confirmation message.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
phpmyadmin/phpmyadminPackagist | >= 4.0.0, < 4.0.10.1 | 4.0.10.1 |
phpmyadmin/phpmyadminPackagist | >= 4.1.0, < 4.1.14.2 | 4.1.14.2 |
phpmyadmin/phpmyadminPackagist | >= 4.2.0, < 4.2.6 | 4.2.6 |
Patches
129a1f56495a7bug #4492 [security] XSS in AJAX confirmation messages
3 files changed · +4 −2
ChangeLog+1 −0 modified@@ -15,6 +15,7 @@ phpMyAdmin - ChangeLog - bug #4459 First few characters of database name aren't clickable when expanded - bug #4486 [security] XSS injection due to unescaped table comment - bug #4488 [security] XSS injection due to unescaped table name (triggers) +- bug #4492 [security] XSS in AJAX confirmation messages 4.2.5.0 (2014-06-26) - bug #4467 shell_exec() has been disabled for security reasons
js/functions.js+2 −2 modified@@ -3548,7 +3548,7 @@ AJAX.registerOnload('functions.js', function () { var question = PMA_messages.strDropTableStrongWarning + ' '; question += $.sprintf( PMA_messages.strDoYouReally, - 'DROP TABLE ' + PMA_commonParams.get('table') + 'DROP TABLE ' + escapeHtml(PMA_commonParams.get('table')) ); $(this).PMA_confirm(question, $(this).attr('href'), function (url) { @@ -3614,7 +3614,7 @@ AJAX.registerOnload('functions.js', function () { var question = PMA_messages.strTruncateTableStrongWarning + ' '; question += $.sprintf( PMA_messages.strDoYouReally, - 'TRUNCATE ' + PMA_commonParams.get('table') + 'TRUNCATE ' + escapeHtml(PMA_commonParams.get('table')) ); $(this).PMA_confirm(question, $(this).attr('href'), function (url) { PMA_ajaxShowMessage(PMA_messages.strProcessingRequest);
js/tbl_structure.js+1 −0 modified@@ -198,6 +198,7 @@ AJAX.registerOnload('tbl_structure.js', function () { * @var curr_column_name String containing name of the field referred to by {@link curr_row} */ var curr_column_name = $curr_row.children('th').children('label').text(); + curr_column_name = escapeHtml(curr_column_name); /** * @var $after_field_item Corresponding entry in the 'After' field. */
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- www.phpmyadmin.net/home_page/security/PMASA-2014-6.phpnvdVendor AdvisoryWEB
- github.com/advisories/GHSA-jqmr-wqgp-8mh2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-4986ghsaADVISORY
- lists.opensuse.org/opensuse-updates/2014-08/msg00045.htmlnvdWEB
- github.com/phpmyadmin/phpmyadmin/commit/29a1f56495a7d1d98da31a614f23c0819a606a4dnvdWEB
- security.gentoo.org/glsa/201505-03nvdWEB
- web.archive.org/web/20200228081340/http://www.securityfocus.com/bid/68803ghsaWEB
- secunia.com/advisories/60397nvd
- www.securityfocus.com/bid/68803nvd
News mentions
0No linked articles in our index yet.