phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6.
References
Configurations
History
09 Jan 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* | |
First Time |
Phpmyfaq
Phpmyfaq phpmyfaq |
|
References | () https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459 - Patch | |
References | () https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209 - Patch | |
References | () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx - Exploit, Vendor Advisory |
21 Nov 2024, 09:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459 - | |
References | () https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209 - | |
References | () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx - |
26 Mar 2024, 12:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Mar 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-25 19:15
Updated : 2025-01-09 17:16
NVD link : CVE-2024-27300
Mitre link : CVE-2024-27300
CVE.ORG link : CVE-2024-27300
JSON object : View
Products Affected
phpmyfaq
- phpmyfaq
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')