{"id":"CVE-2022-23807","details":"An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.","aliases":["BIT-phpmyadmin-2022-23807","GHSA-8wf2-3ggj-78q9"],"modified":"2026-05-18T05:53:40.824933412Z","published":"2022-01-22T00:00:00Z","related":["openSUSE-SU-2023:0047-1","openSUSE-SU-2023:0154-1","openSUSE-SU-2024:11765-1"],"database_specific":{"cna_assigner":"mitre","unresolved_ranges":[{"extracted_events":[{"introduced":"4.9"},{"fixed":"4.9.8"},{"introduced":"5.1"},{"fixed":"5.1.2"}],"source":"DESCRIPTION"}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23807.json"},"references":[{"type":"WEB","url":"https://www.phpmyadmin.net/security/PMASA-2022-1/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23807.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23807"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-17"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phpmyadmin/phpmyadmin","events":[{"introduced":"4ab33481be875d188d5e5c0860dd1499cd92e9d3"},{"fixed":"1a02b323965f9120782ca1a4549096e00c071603"},{"introduced":"333edd4a793e95a04ee97951ee48807350dca728"},{"fixed":"62563091364a6fcebb67bace94febbd4acdca0f7"}],"database_specific":{"extracted_events":[{"introduced":"4.9.0"},{"fixed":"4.9.8"},{"introduced":"5.1.0"},{"fixed":"5.1.2"}],"cpe":"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["RELEASE_5_1_1","RELEASE_5_1_0","RELEASE_4_9_7","RELEASE_4_9_6","RELEASE_4_9_5","RELEASE_4_9_4","RELEASE_4_9_3","RELEASE_4_9_2","RELEASE_4_9_1","RELEASE_4_9_0_1","RELEASE_4_9_0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-23807.json"}}],"schema_version":"1.7.5"}