A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set.
Unfortunately it seems that upstream is stalled. See https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/ for more info, as well as upstream itself at https://github.com/leenooks/phpLDAPadmin . It would be fine if someone with good experience in PHP could help with providing a patch. (Note: still no such a patch in Debian too).