
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in phpMyAdmin versions 4.9 before 4.9.8 and 5.1 before 5.1.2, identified as CVE-2022-23807. The vulnerability allows authenticated users to bypass two-factor authentication (2FA) for future login instances through a specific sequence of actions (PhpMyAdmin Security, NVD).
The vulnerability involves a sequence of actions that a valid user can perform to manipulate their account settings. A user must first authenticate to phpMyAdmin using their two-factor authentication method to prepare their account for the bypass. This represents a security weakness in how phpMyAdmin processes a user's two-factor status (PhpMyAdmin Security).
The impact of this vulnerability is considered not severe due to the prerequisites required for exploitation. The vulnerability only affects authenticated users who already have access to their accounts, and these users can already disable two-factor authentication through conventional means (PhpMyAdmin Security).
The vulnerability has been patched in phpMyAdmin versions 4.9.8 and 5.1.2. Users are advised to upgrade to these versions or newer. A patch has also been made available through commit ca54f1db050859eb8555875c6aa5d7796fdf4b32 (PhpMyAdmin Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."