CVE-2024-28107

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*

History

09 Jan 2025, 17:01

Type Values Removed Values Added
References () https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007 - () https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007 - Patch
References () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r - () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r - Exploit, Vendor Advisory
First Time Phpmyfaq phpmyfaq
Phpmyfaq
CPE cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*

Information

Published : 2024-03-25 19:15

Updated : 2025-01-09 17:01


NVD link : CVE-2024-28107

Mitre link : CVE-2024-28107

CVE.ORG link : CVE-2024-28107


JSON object : View

Products Affected

phpmyfaq

  • phpmyfaq
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')