phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Phpmyfaq
Phpmyfaq phpmyfaq |
|
CPEs | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* | |
Vendors & Products |
Phpmyfaq
Phpmyfaq phpmyfaq |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:48:49.230Z
Reserved: 2024-03-04T14:19:14.059Z
Link: CVE-2024-28107

Updated: 2024-08-02T00:48:49.230Z

Status : Analyzed
Published: 2024-03-25T19:15:58.477
Modified: 2025-01-09T17:01:02.587
Link: CVE-2024-28107

No data.