Description
phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solution_id_{id}.html endpoint. Attackers can sequentially iterate solution IDs to discover all FAQs including those restricted to specific users or groups, leaking sensitive metadata through redirect Location headers and page canonical links.
Published: 2026-05-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability originates from the getIdFromSolutionId() function in phpMyFAQ, where the function performs no permission checks before returning FAQ information. Because of this oversight, an attacker without authentication can access titles of restricted FAQ entries by simply requesting the /solution_id_{id}.html URL. The exposed data include metadata conveyed through redirect Location headers and canonical URLs, enabling enumeration of FAQ content and the discovery of entries reserved for specific users or groups. This flaw is classified as CWE‑863, a lack of permission check that permits unauthorized information disclosure.

Affected Systems

All installations of phpMyFAQ older than version 4.1.2 are affected. The issue exists in the getIdFromSolutionId() handler accessed through the /solution_id_{id}.html endpoint. Users running these pre‑4.1.2 releases should verify the installed version against the vendor’s release notes to determine if they are vulnerable.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, and the vulnerability is exploitable remotely with no authentication required. EPSS data is not available, so the exploitation likelihood cannot be quantified, but the flaw is openly documented and the attack path is trivial to emulate. The vulnerability is not listed in CISA’s KEV catalog. Attackers can sequentially iterate numeric solution IDs to discover all FAQ entries, including those intended for only privileged audiences, thus leaking sensitive metadata. The impact primarily involves confidentiality compromise, potentially aiding further reconnaissance or targeted attacks.

Generated by OpenCVE AI on May 15, 2026 at 20:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to phpMyFAQ version 4.1.2 or later to eliminate the unfiltered getIdFromSolutionId endpoint
  • If an upgrade is not immediately possible, block or restrict access to the /solution_id_{id}.html URL pattern using web‑application firewalls or server‑side redirects so only authenticated users can reach it
  • Implement application‑level permission checks around any API that returns FAQ identifiers or metadata to prevent unauthorized enumeration

Generated by OpenCVE AI on May 15, 2026 at 20:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Thorsten
Thorsten phpmyfaq
Vendors & Products Thorsten
Thorsten phpmyfaq

Fri, 15 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solution_id_{id}.html endpoint. Attackers can sequentially iterate solution IDs to discover all FAQs including those restricted to specific users or groups, leaking sensitive metadata through redirect Location headers and page canonical links.
Title phpMyFAQ - Unauthenticated Information Disclosure via getIdFromSolutionId Permission Bypass
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Thorsten Phpmyfaq
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-15T20:17:08.170Z

Reserved: 2026-05-13T19:40:27.809Z

Link: CVE-2026-46366

cve-icon Vulnrichment

Updated: 2026-05-15T20:17:04.414Z

cve-icon NVD

Status : Received

Published: 2026-05-15T19:17:03.973

Modified: 2026-05-15T21:16:38.963

Link: CVE-2026-46366

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T20:45:08Z

Weaknesses