phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Phpmyfaq
Phpmyfaq phpmyfaq |
|
CPEs | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* | |
Vendors & Products |
Phpmyfaq
Phpmyfaq phpmyfaq |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:28:00.229Z
Reserved: 2024-02-22T18:08:38.875Z
Link: CVE-2024-27300

Updated: 2024-08-02T00:28:00.229Z

Status : Analyzed
Published: 2024-03-25T19:15:57.807
Modified: 2025-01-09T17:16:12.273
Link: CVE-2024-27300

No data.