SQL Injection Vulnerability in phpMyFAQ 3.2.5 Allows for Data Exfiltration and Account Takeover
CVE-2024-27299

8.8HIGH

Key Information:

Vendor

Thorsten

Status
Vendor
CVE Published:
25 March 2024

What is CVE-2024-27299?

A SQL injection vulnerability exists in the 'Add News' functionality of phpMyFAQ, an open-source FAQ application. The flaw arises from improper sanitization of the 'authorEmail' field, which uses PHP's 'FILTER_VALIDATE_EMAIL'. Consequently, any authenticated user who can add or edit FAQ news can exploit this vulnerability to exfiltrate sensitive data, take control of user accounts, and potentially execute remote code. This issue has been addressed in version 3.2.6, highlighting the importance of proper input validation and escaping methodologies in web applications.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

phpMyFAQ 3.2.5

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.