cpe:2.3:a:phpmyfaq:phpmyfaq:0.80a:*:*:*:*:*:*:*
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.
Max CVSS
6.5
EPSS Score
0.07%
Published
2024-02-05
Updated
2024-02-12
phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionality where anyone can share a FAQ item to others. The front-end of this functionality allows any phpMyFAQ articles to be shared with 5 email addresses. Any unauthenticated actor can perform this action. There is a CAPTCHA in place, however the amount of people you email with a single request is not limited to 5 by the backend. An attacker can thus solve a single CAPTCHA and send thousands of emails at once. An attacker can utilize the target application's email server to send phishing messages. This can get the server on a blacklist, causing all emails to end up in spam. It can also lead to reputation damages. This issue has been patched in version 3.2.5.
Max CVSS
6.5
EPSS Score
0.05%
Published
2024-02-05
Updated
2024-02-12
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. phpMyFAQ's user removal page allows an attacker to spoof another user's detail, and in turn make a compelling phishing case for removing another user's account. The front-end of this page doesn't allow changing the form details, an attacker can utilize a proxy to intercept this request and submit other data. Upon submitting this form, an email is sent to the administrator informing them that this user wants to delete their account. An administrator has no way of telling the difference between the actual user wishing to delete their account or the attacker issuing this for an account they do not control. This issue has been patched in version 3.2.5.
Max CVSS
6.5
EPSS Score
0.05%
Published
2024-02-05
Updated
2024-02-13
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.
Max CVSS
5.4
EPSS Score
0.05%
Published
2023-12-16
Updated
2024-02-08
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.
Max CVSS
5.4
EPSS Score
0.05%
Published
2023-12-16
Updated
2024-02-08
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
Max CVSS
5.4
EPSS Score
0.05%
Published
2023-10-31
Updated
2023-11-08
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1.
Max CVSS
6.3
EPSS Score
0.05%
Published
2023-10-31
Updated
2023-11-08
Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-10-31
Updated
2023-11-09
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1.
Max CVSS
7.4
EPSS Score
0.05%
Published
2023-10-31
Updated
2023-11-08
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
Max CVSS
7.4
EPSS Score
0.05%
Published
2023-10-31
Updated
2023-11-08
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
Max CVSS
9.0
EPSS Score
0.05%
Published
2023-09-30
Updated
2023-10-02
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
Max CVSS
8.3
EPSS Score
0.05%
Published
2023-09-30
Updated
2023-10-02
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
Max CVSS
6.3
EPSS Score
0.05%
Published
2023-09-30
Updated
2023-10-02
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
Max CVSS
9.1
EPSS Score
0.05%
Published
2023-09-30
Updated
2023-10-02
Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-09-30
Updated
2023-10-02
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-07-31
Updated
2023-08-03
Improper Neutralization of Formula Elements in a CSV File in GitHub repository thorsten/phpmyfaq prior to 3.1.16.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-07-31
Updated
2023-08-03
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.2.
Max CVSS
5.2
EPSS Score
0.05%
Published
2023-06-30
Updated
2023-07-06
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.
Max CVSS
6.7
EPSS Score
0.05%
Published
2023-05-31
Updated
2023-06-03
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.
Max CVSS
6.1
EPSS Score
0.05%
Published
2023-05-31
Updated
2023-06-03
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.
Max CVSS
7.2
EPSS Score
0.05%
Published
2023-05-17
Updated
2023-05-24
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.
Max CVSS
7.2
EPSS Score
0.05%
Published
2023-05-17
Updated
2023-05-24
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
Max CVSS
8.2
EPSS Score
0.05%
Published
2023-05-05
Updated
2023-05-10
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-04-30
Updated
2023-05-06
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
Max CVSS
6.1
EPSS Score
0.05%
Published
2023-04-30
Updated
2023-05-06
103 vulnerabilities found
1 2 3 4 5
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!