Description
phpMyFAQ is an open source FAQ web application. Versions 4.0.14 and 4.0.15 have a stored cross-site scripting (XSS) vulnerability that allows an attacker to execute arbitrary JavaScript in an administrator’s browser by registering a user whose display name contains HTML entities. When an administrator views the admin user list, the payload is decoded server-side and rendered without escaping, resulting in script execution in the admin context. Version 4.0.16 contains a patch for the issue.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-jv8r-hv7q-p6vc
Patch x_refsource_misc
https://github.com/thorsten/phpMyFAQ/commit/61829e83411f7b28bc6fd1052bfde54c32c6c370
Patch x_refsource_misc
https://github.com/thorsten/phpMyFAQ/commit/8211d1d25951b4c272443cfc3ef9c09b1363fd87
Scores
CVSS v3
5.4
EPSS
0.0006
EPSS Percentile
19.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (3)
phpmyfaq/phpmyfaq
4.1.0 rc
phpmyfaq/phpmyfaq
4.0.14 - 4.0.16
thorsten/phpmyfaq
4.0.14 - 4.0.16Packagist
Published
Dec 29, 2025
Tracked Since
Feb 18, 2026