Description
phpMyFAQ is an open source FAQ web application. Prior to version 4.0.18, the WebAuthn prepare endpoint (`/api/webauthn/prepare`) creates new active user accounts without any authentication, CSRF protection, captcha, or configuration checks. This allows unauthenticated attackers to create unlimited user accounts even when registration is disabled. Version 4.0.18 fixes the issue.
Published: 2026-02-27
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Account Creation
Action: Immediate Patch
AI Analysis

Impact

A request to the WebAuthn prepare endpoint creates new, active user accounts without requiring any form of authentication, CSRF protection, captcha, or configuration checks. The flaw allows an attacker to create an unlimited number of accounts even when the application’s registration feature is disabled. This could enable malicious users to gain access to internal resources, perform spam or phishing campaigns, or evade rate‑limiting controls. The weakness is a classic "Missing Authorization" error (CWE‑862).

Affected Systems

The vulnerability affects phpMyFAQ installations from thorsten running any version prior to 4.0.18; no additional sub-components are listed.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity: the vulnerability can be exploited remotely with no authentication and would lead to a significant increase in the attack surface. The EPSS score of less than 1% suggests that, while exploitability exists, the probability of exploitation in the near term is small. The vulnerability is not included in the CISA KEV catalog, pointing to an absence of known large‑scale exploitation. Because the endpoint is reachable over HTTP/HTTPS and requires no credentials, the attack vector is straightforward – simply sending a crafted request to /api/webauthn/prepare. With no CSRF or other mitigations in place, a single web request suffices to create an account, enabling further attack activities.

Generated by OpenCVE AI on April 17, 2026 at 13:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update phpMyFAQ to version 4.0.18 or later, which removes the unauthenticated account creation flaw.
  • If an immediate upgrade is not possible, restrict access to the /api/webauthn/prepare endpoint – for example by blocking the URL in the web server configuration or limiting it to the localhost interface.
  • Implement additional controls such as rate limiting or CAPTCHA on account‑creation endpoints, and disable the registration feature in the application configuration to reduce the risk of unauthenticated account creation.

Generated by OpenCVE AI on April 17, 2026 at 13:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w22q-m2fm-x9f4 phpMyFAQ Allows Unauthenticated Account Creation via WebAuthn Prepare Endpoint
History

Wed, 04 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Phpmyfaq
Phpmyfaq phpmyfaq
CPEs cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*
Vendors & Products Phpmyfaq
Phpmyfaq phpmyfaq

Tue, 03 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Thorsten
Thorsten phpmyfaq
Vendors & Products Thorsten
Thorsten phpmyfaq

Fri, 27 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description phpMyFAQ is an open source FAQ web application. Prior to version 4.0.18, the WebAuthn prepare endpoint (`/api/webauthn/prepare`) creates new active user accounts without any authentication, CSRF protection, captcha, or configuration checks. This allows unauthenticated attackers to create unlimited user accounts even when registration is disabled. Version 4.0.18 fixes the issue.
Title phpMyFAQ Allows Unauthenticated Account Creation via WebAuthn Prepare Endpoint
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Phpmyfaq Phpmyfaq
Thorsten Phpmyfaq
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-03T20:25:01.562Z

Reserved: 2026-02-24T02:32:39.801Z

Link: CVE-2026-27836

cve-icon Vulnrichment

Updated: 2026-03-03T20:24:58.288Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T20:21:40.330

Modified: 2026-03-04T16:08:53.133

Link: CVE-2026-27836

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:00:15Z

Weaknesses