Description
phpMyFAQ is an open source FAQ web application. Versions 4.0.16 and below allow an authenticated user without the dlattachment permission to download FAQ attachments due to a incomprehensive permissions check. The presence of a right key is improperly validated as proof of authorization in attachment.php. Additionally, the group and user permission logic contains a flawed conditional expression that may allow unauthorized access. This issue has been fixed in version
Published: 2026-01-24
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized attachment download (Broken Access Control)
Action: Patch
AI Analysis

Impact

phpMyFAQ is an open‑source FAQ web application. In versions 4.0.16 and earlier, the code that serves attachment downloads performs a permission check that merely verifies the existence of a rights key rather than confirming that the user possesses the dlattachment privilege. Additionally, the logic that evaluates group and user permissions contains a flawed conditional expression. These issues allow an authenticated user who does not have the required dlattachment right to download any FAQ attachment files, exposing potentially confidential information to insiders or malicious insiders. The vulnerability is a classic example of broken access control (CWE‑284).

Affected Systems

The affected product is phpMyFAQ, developed by thorsten. The critical versions are 4.0.16 and below; newer releases contain a fix that has been applied. The fix is not yet listed with a specific version in the advisory, so administrators should consult the latest releases on the project’s GitHub page for the corrected code.

Risk and Exploitability

The CVSS v3.1 score is 6.5, indicating moderate severity. The EPSS score is less than 1 %, suggesting a low probability of exploitation in the short term, and the vulnerability is not listed in CISA’s KEV catalog. However, because the flaw only requires the attacker to be authenticated, an internal user or an attacker who has compromised credentials could immediately download documents. The vulnerability does not grant arbitrary code execution or elevate privileges beyond the authenticated session; it simply bypasses a file‑download permission check.

Generated by OpenCVE AI on April 18, 2026 at 02:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest phpMyFAQ release that contains the permission‑check fix; apply the update immediately.
  • If an upgrade is not possible, restrict web‑server access to the attachment directory so that only authenticated users with the dlattachment permission can reach it—use server‑side ACLs or deny rules to block the download endpoint for unauthorized users.
  • Review and harden all permission checks in phpMyFAQ, ensuring that each user‑controlled request parameter is validated against the correct authorization rules and that no other broken access control gaps remain.

Generated by OpenCVE AI on April 18, 2026 at 02:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7p9h-m7m8-vhhv phpMyFAQ: Attachment download allowed without dlattachment right (broken access control)
History

Wed, 28 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Phpmyfaq
Phpmyfaq phpmyfaq
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*
Vendors & Products Phpmyfaq
Phpmyfaq phpmyfaq

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Thorsten
Thorsten phpmyfaq
Vendors & Products Thorsten
Thorsten phpmyfaq

Sat, 24 Jan 2026 02:45:00 +0000

Type Values Removed Values Added
Description phpMyFAQ is an open source FAQ web application. Versions 4.0.16 and below allow an authenticated user without the dlattachment permission to download FAQ attachments due to a incomprehensive permissions check. The presence of a right key is improperly validated as proof of authorization in attachment.php. Additionally, the group and user permission logic contains a flawed conditional expression that may allow unauthorized access. This issue has been fixed in version
Title phpMyFAQ: Attachment download allowed without dlattachment right (broken access control)
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Phpmyfaq Phpmyfaq
Thorsten Phpmyfaq
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-26T15:01:08.459Z

Reserved: 2026-01-22T18:19:49.175Z

Link: CVE-2026-24420

cve-icon Vulnrichment

Updated: 2026-01-26T15:00:59.337Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-24T03:16:00.760

Modified: 2026-01-28T18:25:46.370

Link: CVE-2026-24420

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:00:10Z

Weaknesses