Path Traversal Flaw in phpMyFAQ MediaBrowserController by Thorsten
CVE-2026-34728

8.7HIGH

Key Information:

Vendor

Thorsten

Status
Vendor
CVE Published:
2 April 2026

What is CVE-2026-34728?

phpMyFAQ is an open-source FAQ web application that contains a vulnerability in the MediaBrowserController::index() method prior to version 4.1.1. The method processes file deletions in the media browser but lacks proper path traversal validation. This allows an attacker to manipulate the user-supplied name parameter to access arbitrary files on the server. Additionally, the absence of CSRF token validation enables attackers to exploit this weakness through CSRF attacks, posing a significant risk to system integrity. This flaw has been resolved in version 4.1.1.

Affected Version(s)

phpMyFAQ < 4.1.1

References

CVSS V3.1

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.