Description
phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there is a stored XSS vulnerability via Regex Bypass in Filter::removeAttributes(). This issue has been patched in version 4.1.1.
Published: 2026-04-02
Score: 6.1 Medium
EPSS: n/a
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch Immediately
AI Analysis

Impact

A regular expression bypass in the function that removes attributes allows malicious code to be saved in FAQ entries. When a user views such an entry, the inserted code runs in that user’s browser, giving an attacker the possibility to steal session data, deface the interface, or perform other client‑side attacks associated with CWE‑79.

Affected Systems

All phpMyFAQ instances supplied by thorsten older than version 4.1.1 are vulnerable. The issue was fixed in the 4.1.1 release, so installations running that version or newer are no longer affected.

Risk and Exploitability

The CVSS score of 6.1 classifies this as medium severity. The EPSS score is not provided, and the flaw is not listed in the CISA KEV catalog. Exploitation requires write access to FAQ entries, typically through administrative credentials. If public or unauthenticated content submission is allowed, the risk increases. The attack vector is client‑side, relying on stored malicious content that browsers will execute.

Generated by OpenCVE AI on April 2, 2026 at 17:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade phpMyFAQ to version 4.1.1 or later
  • If an upgrade cannot be performed immediately, limit FAQ editing to trusted administrators and disable public or unauthenticated content submission

Generated by OpenCVE AI on April 2, 2026 at 17:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cv2g-8cj8-vgc7 phpMyFAQ: Stored XSS via Regex Bypass in Filter::removeAttributes()
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Thorsten
Thorsten phpmyfaq
Vendors & Products Thorsten
Thorsten phpmyfaq

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there is a stored XSS vulnerability via Regex Bypass in Filter::removeAttributes(). This issue has been patched in version 4.1.1.
Title phpMyFAQ: Stored XSS via Regex Bypass in Filter::removeAttributes()
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}


Subscriptions

Thorsten Phpmyfaq
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T18:44:47.729Z

Reserved: 2026-03-30T18:41:20.754Z

Link: CVE-2026-34729

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-02T15:16:42.393

Modified: 2026-04-02T15:16:42.393

Link: CVE-2026-34729

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:20:20Z

Weaknesses