Логотип exploitDog
bind:CVE-2025-62519
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-62519

Количество 2

Количество 2

nvd логотип

CVE-2025-62519

3 месяца назад

phpMyFAQ is an open source FAQ web application. Prior to version 4.0.14, an authenticated SQL injection vulnerability in the main configuration update functionality of phpMyFAQ allows a privileged user with 'Configuration Edit' permissions to execute arbitrary SQL commands. Successful exploitation can lead to a full compromise of the database, including reading, modifying, or deleting all data, as well as potential remote code execution depending on the database configuration. This issue has been patched in version 4.0.14.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-fxm2-cmwj-qvx4

3 месяца назад

phpMyFAQ has Authenticated SQL Injection in Configuration Update Functionality

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-62519

phpMyFAQ is an open source FAQ web application. Prior to version 4.0.14, an authenticated SQL injection vulnerability in the main configuration update functionality of phpMyFAQ allows a privileged user with 'Configuration Edit' permissions to execute arbitrary SQL commands. Successful exploitation can lead to a full compromise of the database, including reading, modifying, or deleting all data, as well as potential remote code execution depending on the database configuration. This issue has been patched in version 4.0.14.

CVSS3: 7.2
0%
Низкий
3 месяца назад
github логотип
GHSA-fxm2-cmwj-qvx4

phpMyFAQ has Authenticated SQL Injection in Configuration Update Functionality

CVSS3: 7.2
0%
Низкий
3 месяца назад

Уязвимостей на страницу