In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).
lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-10804.yaml
github.com/phpmyadmin/composer
lists.fedoraproject.org/archives/list/[email protected]/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ
lists.fedoraproject.org/archives/list/[email protected]/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK
lists.fedoraproject.org/archives/list/[email protected]/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO
nvd.nist.gov/vuln/detail/CVE-2020-10804
www.phpmyadmin.net/security/PMASA-2020-2