Sunday, April 27, 2025
HomeSecurity UpdatesphpMyAdmin 4.8.5 Released with Fixes for SQL injection and Arbitrary File Read...

phpMyAdmin 4.8.5 Released with Fixes for SQL injection and Arbitrary File Read Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

phpMyAdmin 4.8.5 released with security fixes for multiple critical vulnerabilities and other major bug fixes.It is a free software tool that handles and handles the administration of MySQL databases.

phpMyAdmin 4.8.5 – Security fixes

Arbitrary File Read

If the AllowArbitraryServer is set to true with the server configuration, then an attacker with rogue MySQL server can read the files that web server user can access.

The vulnerability considered as critical and can be mitigated by setting AllowArbitraryServer configuration set to false.

- Advertisement - Google News

phpMyAdmin from 4.0 through 4.8.4 are affected and it has been fixed with phpMyAdmin 4.8.5 or newer versions.

SQL injection

The vulnerability resides with the design feature, an attacker could exploit the vulnerability with a specially crafted username that could be used to trigger SQL injection attack.

The vulnerability considered to be serious and it affects versions from 4.5.0 through 4.8.4 and it has been fixed with phpMyAdmin 4.8.5 or newer versions.

Other Bug Fixes

  • Export to SQL format not available
  • QR code not shown when adding two-factor authentication to a user account
  • Issue with adding a new user in MySQL 8.0.11 and newer
  • Frozen interface relating to Text_Plain_Sql plugin
  • Table level Operations tab was missing

Related Read

Parrot Security OS 4.3 Released with Updates for Popular Hacking Tools and Linux Kernel Version

Oracle Released Security Update Addresses a Critical Database Vulnerability That Affects Multiple Versions

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

WooCommerce Users Targeted by Fake Security Vulnerability Alerts

A concerning large-scale phishing campaign targeting WooCommerce users has been uncovered by the Patchstack...

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...