phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-03-25T18:30:35.810Z

Updated: 2024-08-02T00:28:00.229Z

Reserved: 2024-02-22T18:08:38.875Z

Link: CVE-2024-27300

cve-icon Vulnrichment

Updated: 2024-08-02T00:28:00.229Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-25T19:15:57.807

Modified: 2024-03-26T12:55:05.010

Link: CVE-2024-27300

cve-icon Redhat

No data.