Описание
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The email field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's FILTER_VALIDATE_EMAIL function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6.
Ссылки
- Patch
- Patch
- ExploitVendor Advisory
- Patch
- Patch
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*
EPSS
Процентиль: 69%
0.00603
Низкий
5.5 Medium
CVSS3
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 5.5
github
почти 2 года назад
phpMyFAQ stored Cross-site Scripting at user email
CVSS3: 5.5
fstec
почти 2 года назад
Уязвимость функции FILTER_VALIDATE_EMAIL веб-приложения phpMyFAQ, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 69%
0.00603
Низкий
5.5 Medium
CVSS3
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79