Description
phpMyFAQ before 4.1.2 contains missing permission checks in ConfigurationTabController.php where 12 endpoints use userIsAuthenticated() instead of userHasPermission(CONFIGURATION_EDIT). Any authenticated user can enumerate system configuration metadata including permission model, cache backend, mail provider, and translation provider by querying /admin/api/configuration endpoints, violating least privilege access control.
Published: 2026-05-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability originates from missing permission checks in twelve configuration API endpoints within phpMyFAQ. The code verifies only that a user is authenticated but does not confirm that the user has the CONFIGURATION_EDIT permission. Consequently, any authenticated user can query the /admin/api/configuration endpoints to retrieve detailed system configuration metadata, exposing the permission model, cache backend, mail provider, and translation provider. This exposure violates the principle of least privilege and enables attackers to gather sensitive configuration information.

Affected Systems

phpMyFAQ versions prior to 4.1.2, developed by thorsten, are susceptible. Instances running any of these releases are affected.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity. Exploitation requires only legitimate login credentials, a condition fulfilled by any authenticated user. The vulnerability is not listed in the CISA KEV catalog and the EPSS score is unavailable, leaving the likelihood of exploitation uncertain but potentially high in environments with broad user access. Administrators should treat this as a moderate risk that can be mitigated by installing the patch.

Generated by OpenCVE AI on May 15, 2026 at 20:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade phpMyFAQ to version 4.1.2 or later, which implements the correct permission checks for the 12 configuration endpoints.
  • Reconfigure the application so that only users granted CONFIGURATION_EDIT permission can access /admin/api/configuration; remove accidental elevation for other roles.
  • If immediate upgrade is not possible, restrict access to the 12 endpoints by placing them behind stricter authentication controls or by configuring the web server to deny access to /admin/api/configuration for non‑privileged users.

Generated by OpenCVE AI on May 15, 2026 at 20:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Thorsten
Thorsten phpmyfaq
Vendors & Products Thorsten
Thorsten phpmyfaq

Fri, 15 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description phpMyFAQ before 4.1.2 contains missing permission checks in ConfigurationTabController.php where 12 endpoints use userIsAuthenticated() instead of userHasPermission(CONFIGURATION_EDIT). Any authenticated user can enumerate system configuration metadata including permission model, cache backend, mail provider, and translation provider by querying /admin/api/configuration endpoints, violating least privilege access control.
Title phpMyFAQ - Missing Permission Check on 12 Configuration API Endpoints Allows Information Disclosure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Thorsten Phpmyfaq
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-16T01:17:00.417Z

Reserved: 2026-05-08T16:43:53.068Z

Link: CVE-2026-45007

cve-icon Vulnrichment

Updated: 2026-05-16T01:16:55.126Z

cve-icon NVD

Status : Received

Published: 2026-05-15T19:17:01.063

Modified: 2026-05-16T02:16:15.103

Link: CVE-2026-45007

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T22:00:12Z

Weaknesses