CVE-2026-24421

MEDIUM

phpMyFAQ <4.0.16 - Auth Bypass

Title source: llm
STIX 2.1

Description

phpMyFAQ is an open source FAQ web application. Versions 4.0.16 and below have flawed authorization logic which exposes the /api/setup/backup endpoint to any authenticated user despite their permissions. SetupController.php uses userIsAuthenticated() but does not verify that the requester has configuration/admin permissions. Non-admin users can trigger a configuration backup and retrieve its path. The endpoint only checks authentication, not authorization, and returns a link to the generated ZIP. This issue is fixed in version 4.0.17.

Exploits (1)

exploitdb WORKING POC
by contact · textwebappsphp
https://www.exploit-db.com/exploits/52523

References (1)

Core 1
Core References

Scores

CVSS v3 6.5
EPSS 0.0027
EPSS Percentile 50.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-862
Status published
Products (3)
phpmyfaq/phpmyfaq < 4.0.17
phpmyfaq/phpmyfaq 0 - 4.0.17Packagist
thorsten/phpmyfaq 0 - 4.0.17Packagist
Published Jan 24, 2026
Tracked Since Feb 18, 2026