Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wm8h-26fv-mg7g

Опубликовано: 23 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

phpMyFAQ: /api/setup/backup accessible to any authenticated user (authz missing)

Summary

Authenticated non‑admin users can call /api/setup/backup and trigger a configuration backup. The endpoint only checks authentication, not authorization, and returns a link to the generated ZIP.

Details

SetupController.php uses userIsAuthenticated() but does not verify that the requester has configuration/admin permissions. This allows any logged‑in user to create a sensitive backup and retrieve its path.

PoC

Precondition: API enabled, any authenticated non‑admin user.

  • Log in as a non‑admin user.
  • Call backup endpoint.
curl -c /tmp/pmf_api_cookies.txt \ -H 'Content-Type: application/json' \ -d '{"username":"tester","password":"Test1234!"}' \ http://192.168.40.16/phpmyfaq/api/v3.0/login curl -i -b /tmp/pmf_api_cookies.txt \ -X POST --data '4.0.16' \ http://192.168.40.16/phpmyfaq/api/setup/backup

Impact

Low‑privileged users can generate sensitive backups. If the ZIP is web‑accessible (server misconfiguration), this can lead to secret exposure.

Пакеты

Наименование

phpmyfaq/phpmyfaq

composer
Затронутые версииВерсия исправления

<= 4.0.16

4.0.17

Наименование

thorsten/phpmyfaq

composer
Затронутые версииВерсия исправления

<= 4.0.16

4.0.17

EPSS

Процентиль: 2%
0.00014
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-285
CWE-862

Связанные уязвимости

CVSS3: 6.5
nvd
14 дней назад

phpMyFAQ is an open source FAQ web application. Versions 4.0.16 and below have flawed authorization logic which exposes the /api/setup/backup endpoint to any authenticated user despite their permissions. SetupController.php uses userIsAuthenticated() but does not verify that the requester has configuration/admin permissions. Non-admin users can trigger a configuration backup and retrieve its path. The endpoint only checks authentication, not authorization, and returns a link to the generated ZIP. This issue is fixed in version 4.0.17.

EPSS

Процентиль: 2%
0.00014
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-285
CWE-862