phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-03-25T18:30:35.810Z
Updated: 2024-08-02T00:28:00.229Z
Reserved: 2024-02-22T18:08:38.875Z
Link: CVE-2024-27300
Vulnrichment
Updated: 2024-08-02T00:28:00.229Z
NVD
Status : Awaiting Analysis
Published: 2024-03-25T19:15:57.807
Modified: 2024-03-26T12:55:05.010
Link: CVE-2024-27300
Redhat
No data.