CVE-2024-27300

MEDIUM

phpMyFAQ - XSS

Title source: llm
STIX 2.1

Description

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6.

Scores

CVSS v3 5.5
EPSS 0.0079
EPSS Percentile 73.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-79
Status published
Products (2)
phpmyfaq/phpmyfaq 3.2.5
phpmyfaq/phpmyfaq 3.2.5 - 3.2.6Packagist
Published Mar 25, 2024
Tracked Since Feb 18, 2026