Description
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0847 | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6. |
Github GHSA |
GHSA-6p68-36m6-392r | phpMyFAQ Stored Cross-site Scripting at FAQ News Content |
References
History
Thu, 09 Jan 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpmyfaq
Phpmyfaq phpmyfaq |
|
| CPEs | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpmyfaq
Phpmyfaq phpmyfaq |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:48:49.468Z
Reserved: 2024-03-04T14:19:14.059Z
Link: CVE-2024-28106
Updated: 2024-08-02T00:48:49.468Z
Status : Analyzed
Published: 2024-03-25T19:15:58.263
Modified: 2025-01-09T17:30:11.107
Link: CVE-2024-28106
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA