Hi Tyron
your changes include unprotected (does not require user being logged in and no token check) file file_echo.php, which allows to download arbitrary data. This could be easily used by attacker to pretend data is coming from safe location (where phpMyAdmin is running), while it would actually come from attacker.
I've removed defining of PMA_MINUMUM_COMMON (which does skip all the checks) from this file. As you already seem to pass token with the request, no other change should be needed, but please take care of such dangerous code in future.