phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6.
References
Configurations
History
09 Jan 2025, 17:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007 - Patch | |
References | () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r - Exploit, Vendor Advisory | |
First Time |
Phpmyfaq phpmyfaq
Phpmyfaq |
|
CPE | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* |
Information
Published : 2024-03-25 19:15
Updated : 2025-01-09 17:01
NVD link : CVE-2024-28107
Mitre link : CVE-2024-28107
CVE.ORG link : CVE-2024-28107
JSON object : View
Products Affected
phpmyfaq
- phpmyfaq
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')