Note: This requires the secure_file_priv variable to be empty or pointing to the webroot. B. CVE-2018-12613 (Local File Inclusion)
In some misconfigured environments, a "config" auth type might be used where the credentials are hardcoded. If you find a way to read config.inc.php (via Local File Inclusion), you gain instant access. 3. Post-Auth Exploitation: From SQL to RCE
Force users to login via a non-root account and use sudo -like permissions within MySQL. phpmyadmin hacktricks verified
Hunt for wp_users (WordPress) or users tables to dump hashes for other services.
phpMyAdmin does not always have built-in rate limiting. Using tools like or THC-Hydra , you can perform a dictionary attack against the pma_username and pma_password fields. Information Schema Leakage Note: This requires the secure_file_priv variable to be
In phpMyAdmin 4.3.0 to 4.6.2, a vulnerability in the search feature allowed attackers to execute code through the PHP preg_replace function using the /e (eval) modifier. 4. Advanced Enumeration: HackTricks Style
Check if the /setup/ directory is accessible. If left unconfigured, it can sometimes be used to trick the application into connecting to a remote, malicious database server. 2. Exploiting Authentication If you find a way to read config
Most RCE exploits target versions that are 5+ years old. Summary Table: phpMyAdmin Attack Vectors Requirement Default Creds Poor Configuration Full DB Access LFI (CVE-2018-12613) Version 4.8.x RCE via Session Poisoning SELECT INTO OUTFILE FILE Privilege + Known Path Setup Script Bypass Accessible /setup/ folder Config Manipulation
Look at the footer of the login page or check /README or /Documentation.html .