JSON Viewer

{"name":"CVE-2025-24530","offset":1266915,"version":2,"inserted_at":"2025-01-24T00:57:25.617267Z","payload":{"containers"
  :{"adp":[{"affected":[{"defaultStatus":"affected","platforms":["bookworm","bullseye"],"product":"phpmyadmin","vendor"
  :"debian"},{"defaultStatus":"unaffected","platforms":["sid","trixie"],"product":"phpmyadmin","vendor":"debian"
  ,"versions":[{"lessThan":"4:5.2.2-really5.2.2+20250121+dfsg-1","status":"affected","version":"0","versionType"
  :"deb"}]}],"metrics":[{"other":{"content":{"data":"{\"description\":\"not yet assigned\"}"},"type":"Unknown"}}]
  ,"providerMetadata":{"orgId":"79363d38-fa19-49d1-9214-5f28da3f3ac5","shortName":"debian","x_subShortName":"debian"}
  ,"references":[{"url":"https://security-tracker.debian.org/tracker/CVE-2025-24530"}]},{"affected":[{"defaultStatus"
  :"unknown","platforms":["bionic","focal","jammy","noble","trusty","xenial"],"product":"phpmyadmin","vendor"
  :"canonical"}],"descriptions":[{"lang":"en","value":"An issue was discovered in phpMyAdmin 5.x before 5.2.2. An
  XSSvulnerability has been discovered for the check tables feature. A craftedtable or database name could be used for
  XSS."}],"providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","x_subShortName"
  :"canonical"},"references":[{"url":"https://ubuntu.com/security/CVE-2025-24530"},{"url":"https://www.cve.org/CVERecord
  ?id=CVE-2025-24530"}]}],"cna":{"affected":[{"defaultStatus":"unknown","product":"unknown","vendor":"unknown"}]
  ,"descriptions":[{"lang":"en","value":"An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has
  been discovered for the check tables feature. A crafted table or database name could be used for XSS."},{"lang":"es"
  ,"value":"Se descubrió un problema en phpMyAdmin 5.x anterior a 5.2.2. Se descubrió una vulnerabilidad XSS para la
  función de verificación de tablas. Se podría usar un nombre de tabla o base de datos manipulado para XSS."}],"metrics"
  :[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.4
  ,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope"
  :"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N","version":"3.1"}
  ,"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79","lang":"en"}]}]
  ,"providerMetadata":{"dateUpdated":"2025-01-23T06:15:27Z","orgId":"00000000-0000-4000-A000-000000000003","shortName"
  :"DISCARDED_CNA","x_subShortName":"nvd"},"references":[{"url":"https://www.phpmyadmin.net/security/PMASA-2025-1/"}]}}
  ,"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2025
  -24530","datePublished":"2025-01-23T06:15:27Z","dateUpdated":"2025-01-23T06:15:27Z","state":"PUBLISHED"},"dataType"
  :"CVE_RECORD","dataVersion":"5.0"}}
הההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההה
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Ln:1Col:1
size: 2.82 KB

JSON Sorter
object
{5}
name
:
CVE-2025-24530
offset
:
1266915
version
:
2
inserted_at
:
2025-01-24T00:57:25.617267Z
payload
{4}
containers
{2}
adp
[2]
0
{4}
affected
[2]
0
{4}
defaultStatus
:
affected
platforms
[2]
0
:
bookworm
1
:
bullseye
product
:
phpmyadmin
vendor
:
debian
1
{5}
defaultStatus
:
unaffected
platforms
[2]
0
:
sid
1
:
trixie
product
:
phpmyadmin
vendor
:
debian
versions
[1]
0
{4}
lessThan
:
4:5.2.2-really5.2.2+20250121+dfsg-1
status
:
affected
version
:
0
versionType
:
deb
metrics
[1]
0
{1}
other
{2}
content
{1}
data
:
{\"description\":\"not yet assigned\"}
type
:
Unknown
providerMetadata
{3}
orgId
:
79363d38-fa19-49d1-9214-5f28da3f3ac5
shortName
:
debian
x_subShortName
:
debian
references
[1]
0
{1}
url
:https://security-tracker.debian.org/tracker/CVE-2025-24530
1
{4}
affected
[1]
0
{4}
defaultStatus
:
unknown
platforms
[6]
0
:
bionic
1
:
focal
2
:
jammy
3
:
noble
4
:
trusty
5
:
xenial
product
:
phpmyadmin
vendor
:
canonical
descriptions
[1]
0
{2}
lang
:
en
value
:
An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSSvulnerability has been discovered for the check tables feature. A craftedtable or database name could be used for XSS.
providerMetadata
{3}
orgId
:
cc1ad9ee-3454-478d-9317-d3e869d708bc
shortName
:
canonical
x_subShortName
:
canonical
references
[2]
0
{1}
url
:https://ubuntu.com/security/CVE-2025-24530
1
{1}
url
:https://www.cve.org/CVERecord?id=CVE-2025-24530
cna
{6}
affected
[1]
0
{3}
defaultStatus
:
unknown
product
:
unknown
vendor
:
unknown
descriptions
[2]
0
{2}
lang
:
en
value
:
An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the check tables feature. A crafted table or database name could be used for XSS.
1
{2}
lang
:
es
value
:
Se descubrió un problema en phpMyAdmin 5.x anterior a 5.2.2. Se descubrió una vulnerabilidad XSS para la función de verificación de tablas. Se podría usar un nombre de tabla o base de datos manipulado para XSS.
metrics
[1]
0
{2}
cvssV3_1
{12}
attackComplexity
:
LOW
attackVector
:
NETWORK
availabilityImpact
:
NONE
baseScore
:
6.4
baseSeverity
:
MEDIUM
confidentialityImpact
:
LOW
integrityImpact
:
LOW
privilegesRequired
:
LOW
scope
:
CHANGED
userInteraction
:
NONE
vectorString
:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
version
:
3.1
format
:
CVSS
problemTypes
[1]
0
{1}
descriptions
[1]
0
{3}
cweId
:
CWE-79
description
:
CWE-79
lang
:
en
providerMetadata
{4}
dateUpdated
:
2025-01-23T06:15:27Z
orgId
:
00000000-0000-4000-A000-000000000003
shortName
:
DISCARDED_CNA
x_subShortName
:
nvd
references
[1]
0
{1}
url
:https://www.phpmyadmin.net/security/PMASA-2025-1/
cveMetadata
{6}
assignerOrgId
:
8254265b-2729-46b6-b9e3-3dfca2d5bfca
assignerShortName
:
mitre
cveId
:
CVE-2025-24530
datePublished
:
2025-01-23T06:15:27Z
dateUpdated
:
2025-01-23T06:15:27Z
state
:
PUBLISHED
dataType
:
CVE_RECORD
dataVersion
:
5.0

Ad blocking? It's okay.

Please share on social media to support us:

Tweet Share Post

JSON Beautifier Online


Welcome to the online JSON Viewer, JSON Formatter, and JSON Beautifier at CodeBeautiy.org. JSON is a data format that is gaining popularity and getting used extensively in many AJAX-powered Web sites because of being human-readable.

Many websites offer APIs, which will return data in JSON format. Often the JSON provided has white space removed to reduce the size payload or data. This JSON API formatter gives you a quick and easy way to format the JSON so you can read it. JSON Viewer displays your image preview if the data is an image URL and simplifies JSON data.

What can you do with JSON Viewer?

  • Beautify / Format your JSON.
  • Parse and Display / Explore your JSON String to JSON tree view.
  • Minify / Compress your JSON.
  • Validate your JSON and help you to fix an error.
  • JSON Converter Online transforms into the following formats:
    • Convert your JSON structure into XML format.
    • Convert and export your JSON to CSV format.
  • Hover over the image URL, and this JSON visualizer will display the image.
  • Once you have created JSON Data, you can download it as a file or save it as a link and Share it.
  • JSON Viewer works well on Windows, MAC, Chrome, and Firefox.
  • JSON Pretty Print / Pretty JSON Tool to Prettify JSON data.

JSON File Viewer

  • It's also an online JSON file viewer. Upload the file and view it online.
  • Step 1: Click on File Button at the top center of this page. It will open the file selection dialog of the operating system.
  • Step 2: Select the JSON file. This tool will show the JSON in the parent node tree.

Big Number / Big Int in JSON Beautifier.

  • Please select the Big Num check box to enable large numbers for JSON beautify to a considerable number. By default, this tool uses the browser's JSON library for beautification.
Know more about JSON.

Example for JSON Cleaner

Play with JSON Data: Insurance Company JSON

{
  "InsuranceCompanies":  {
    "Top Insurance Companies":[
      {
        "No": "1",
        "Name": "Berkshire Hathaway ( BRK.A)",
        "Market Capitalization": "$655 billion"
      }
    ],
  "source": "investopedia.com",
  "Time":"May 2021"
  }
}                                             

Pro Tips:

External URL

Load External JSON URL in Browser URL like this https://codebeautify.org/jsonviewer?url=external-url

https://codebeautify.org/jsonviewer?url=https://gist.githubusercontent.com/cbmgit/852c2702d4342e7811c95f8ffc2f017f/raw/InsuranceCompanies.json
Data as Parameter

Load JSON Data in Browser URL input like this https://codebeautify.org/jsonviewer?input=inputdata

https://codebeautify.org/jsonviewer?input={"InsuranceCompanies":{"InsuranceCompany":[{"No":"1","Name":"BerkshireHathaway (BRK.A)","MarketCapitalization":"$507.04billion"}]}}