CVE-2024-28106

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*

History

09 Jan 2025, 17:04

Type Values Removed Values Added
First Time Phpmyfaq phpmyfaq
Phpmyfaq
References () https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a - () https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a - Patch
References () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r - () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r - Exploit, Vendor Advisory
CPE cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*

Information

Published : 2024-03-25 19:15

Updated : 2025-01-09 17:30


NVD link : CVE-2024-28106

Mitre link : CVE-2024-28106

CVE.ORG link : CVE-2024-28106


JSON object : View

Products Affected

phpmyfaq

  • phpmyfaq
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')