Impact
phpMyFAQ before version 4.1.2 allows attackers to submit arbitrary user‑id parameters without any session binding or rate limiting to the /admin/check endpoint. This flaw permits an unauthenticated attacker to brute‑force a victim’s six‑digit TOTP code by sequentially trying all possible tokens. Successful exploitation grants full administrative control, compromising the confidentiality and integrity of the entire instance.
Affected Systems
The vulnerability affects installations of phpMyFAQ prior to the 4.1.2 release. Any server hosting a version before 4.1.2 and exposing the /admin/check endpoint is impacted.
Risk and Exploitability
The CVSS score of 9.1 indicates a critical severity, and while the EPSS score is not available, the lack of rate limiting and session checks suggest a high likelihood of exploitation. The vulnerability is not on the CISA KEV list, but the straightforward attack vector—unauthenticated POST requests—reduces the required skill level for attackers.
OpenCVE Enrichment