phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Phpmyfaq
Phpmyfaq phpmyfaq |
|
CPEs | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* | |
Vendors & Products |
Phpmyfaq
Phpmyfaq phpmyfaq |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:48:49.468Z
Reserved: 2024-03-04T14:19:14.059Z
Link: CVE-2024-28106

Updated: 2024-08-02T00:48:49.468Z

Status : Analyzed
Published: 2024-03-25T19:15:58.263
Modified: 2025-01-09T17:30:11.107
Link: CVE-2024-28106

No data.