Description
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0847 | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6. |
Github GHSA |
GHSA-6p68-36m6-392r | phpMyFAQ Stored Cross-site Scripting at FAQ News Content |
References
History
Thu, 09 Jan 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpmyfaq
Phpmyfaq phpmyfaq |
|
| CPEs | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpmyfaq
Phpmyfaq phpmyfaq |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:48:49.468Z
Reserved: 2024-03-04T14:19:14.059Z
Link: CVE-2024-28106
Updated: 2024-08-02T00:48:49.468Z
Status : Analyzed
Published: 2024-03-25T19:15:58.263
Modified: 2025-01-09T17:30:11.107
Link: CVE-2024-28106
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA