No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpmoadmin
Phpmoadmin phpmoadmin |
|
| Vendors & Products |
Phpmoadmin
Phpmoadmin phpmoadmin |
Fri, 20 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | phpMoAdmin 1.1.5 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized database operations by crafting malicious requests. Attackers can trick authenticated users into submitting GET requests to moadmin.php with parameters like action, db, and collection to create, drop, or repair databases and collections without user consent. | |
| Title | phpMoAdmin 1.1.5 Cross-Site Request Forgery via moadmin.php | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-23T19:40:27.722Z
Reserved: 2026-02-20T18:37:32.015Z
Link: CVE-2019-25451
Updated: 2026-02-23T19:40:13.843Z
Status : Awaiting Analysis
Published: 2026-02-20T23:16:01.713
Modified: 2026-02-23T18:14:13.887
Link: CVE-2019-25451
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:33:12Z