Phpmyfaq

7 CVEs product

Monthly

CVE-2026-27836 HIGH POC PATCH This Week

Unauthenticated account creation in phpMyFAQ versions before 4.0.18 allows remote attackers to register unlimited user accounts through the WebAuthn prepare endpoint without authentication, CSRF protection, or captcha validation, even when registration is disabled. Public exploit code exists for this vulnerability. Update to version 4.0.18 or later to remediate.

CSRF Phpmyfaq
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-24422 MEDIUM POC PATCH This Month

Insufficient access controls in phpMyFAQ 4.0.16 and below expose sensitive information including user email addresses and non-public content through multiple API endpoints, allowing unauthenticated attackers to harvest data for phishing or access private records. Public exploit code exists for this vulnerability, and no patch is currently available. Upgrading to version 4.0.17 or later is required to remediate the exposure.

Information Disclosure Phpmyfaq
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-24420 MEDIUM POC PATCH This Month

Authenticated users in phpMyFAQ 4.0.16 and below can bypass permission checks to download FAQ attachments they should not have access to, due to improper validation of authorization tokens in attachment.php and flawed permission logic. An attacker with valid credentials but without the dlattachment permission can exploit this to retrieve sensitive attachment content. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP Phpmyfaq
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24421 MEDIUM POC PATCH This Month

phpMyFAQ versions 4.0.16 and below allow authenticated users to access the backup API endpoint without proper authorization checks, enabling them to download configuration files containing sensitive data. The vulnerability stems from incomplete authorization validation in SetupController.php, which only verifies authentication rather than admin permissions. Public exploit code exists for this issue, and no patch is currently available.

PHP Phpmyfaq
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-62519 HIGH POC PATCH This Month

phpMyFAQ is an open source FAQ web application. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

SQLi RCE Phpmyfaq
NVD GitHub
CVSS 3.1
7.2
EPSS
0.1%
CVE-2025-59943 HIGH POC PATCH This Week

phpMyFAQ is an open source FAQ web application. Versions 4.0-nightly-2025-10-03 and below do not enforce uniqueness of email addresses during user registration. This allows multiple distinct accounts to be created with the same email. Because email is often used as an identifier for password resets, notifications, and administrative actions, this flaw can cause account ambiguity and, in certain configurations, may lead to privilege escalation or account takeover. This issue is fixed in version 4.0.13.

Authentication Bypass Privilege Escalation Phpmyfaq
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2024-56199 MEDIUM POC This Month

phpMyFAQ is an open source FAQ web application. Rated medium severity (CVSS 5.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Denial Of Service XSS Phpmyfaq
NVD GitHub
CVSS 3.1
5.2
EPSS
0.2%
CVE-2026-27836
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Unauthenticated account creation in phpMyFAQ versions before 4.0.18 allows remote attackers to register unlimited user accounts through the WebAuthn prepare endpoint without authentication, CSRF protection, or captcha validation, even when registration is disabled. Public exploit code exists for this vulnerability. Update to version 4.0.18 or later to remediate.

CSRF Phpmyfaq
NVD GitHub
CVE-2026-24422
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Insufficient access controls in phpMyFAQ 4.0.16 and below expose sensitive information including user email addresses and non-public content through multiple API endpoints, allowing unauthenticated attackers to harvest data for phishing or access private records. Public exploit code exists for this vulnerability, and no patch is currently available. Upgrading to version 4.0.17 or later is required to remediate the exposure.

Information Disclosure Phpmyfaq
NVD GitHub
CVE-2026-24420
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Authenticated users in phpMyFAQ 4.0.16 and below can bypass permission checks to download FAQ attachments they should not have access to, due to improper validation of authorization tokens in attachment.php and flawed permission logic. An attacker with valid credentials but without the dlattachment permission can exploit this to retrieve sensitive attachment content. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP Phpmyfaq
NVD GitHub
CVE-2026-24421
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

phpMyFAQ versions 4.0.16 and below allow authenticated users to access the backup API endpoint without proper authorization checks, enabling them to download configuration files containing sensitive data. The vulnerability stems from incomplete authorization validation in SetupController.php, which only verifies authentication rather than admin permissions. Public exploit code exists for this issue, and no patch is currently available.

PHP Phpmyfaq
NVD GitHub
CVE-2025-62519
EPSS 0% CVSS 7.2
HIGH POC PATCH This Month

phpMyFAQ is an open source FAQ web application. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

SQLi RCE Phpmyfaq
NVD GitHub
CVE-2025-59943
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

phpMyFAQ is an open source FAQ web application. Versions 4.0-nightly-2025-10-03 and below do not enforce uniqueness of email addresses during user registration. This allows multiple distinct accounts to be created with the same email. Because email is often used as an identifier for password resets, notifications, and administrative actions, this flaw can cause account ambiguity and, in certain configurations, may lead to privilege escalation or account takeover. This issue is fixed in version 4.0.13.

Authentication Bypass Privilege Escalation Phpmyfaq
NVD GitHub
CVE-2024-56199
EPSS 0% CVSS 5.2
MEDIUM POC This Month

phpMyFAQ is an open source FAQ web application. Rated medium severity (CVSS 5.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Denial Of Service XSS Phpmyfaq
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy