Description
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0986 | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6. |
Github GHSA |
GHSA-q7g6-xfh2-vhpx | phpMyFAQ stored Cross-site Scripting at user email |
References
History
Thu, 09 Jan 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpmyfaq
Phpmyfaq phpmyfaq |
|
| CPEs | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpmyfaq
Phpmyfaq phpmyfaq |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:28:00.229Z
Reserved: 2024-02-22T18:08:38.875Z
Link: CVE-2024-27300
Updated: 2024-08-02T00:28:00.229Z
Status : Analyzed
Published: 2024-03-25T19:15:57.807
Modified: 2025-01-09T17:16:12.273
Link: CVE-2024-27300
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA