Home

Description

phpMoAdmin 1.1.5 contains a stored cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the collection parameter. Attackers can send GET requests to moadmin.php with script payloads in the collection parameter during collection creation to execute arbitrary JavaScript in users' browsers.

PUBLISHED Reserved 2026-02-20 | Published 2026-02-20 | Updated 2026-02-23 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.1.5
affected

Credits

Ozer Goker finder

References

www.exploit-db.com/exploits/46082 (ExploitDB-46082) exploit

www.phpmoadmin.com/ (phpMoAdmin Official Website) product

www.vulncheck.com/...site-scripting-via-collection-parameter (VulnCheck Advisory: phpMoAdmin 1.1.5 Stored Cross-Site Scripting via collection Parameter) third-party-advisory

cve.org (CVE-2019-25454)

nvd.nist.gov (CVE-2019-25454)

Download JSON