Vulnerability Description
Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
CVSS Score
8.1
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpmyfaq | Phpmyfaq | < 3.1.11 |
Related Weaknesses (CWE)
References
- https://github.com/thorsten/phpmyfaq/commit/40515c74815ace394ab23c6c19cbb33fd490Patch
- https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5Permissions Required
- https://github.com/thorsten/phpmyfaq/commit/40515c74815ace394ab23c6c19cbb33fd490Patch
- https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5Permissions Required
- https://huntr.com/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5
FAQ
What is CVE-2023-0789?
CVE-2023-0789 is a vulnerability with a CVSS score of 8.1 (HIGH). Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
How severe is CVE-2023-0789?
CVE-2023-0789 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0789?
Check the references section above for vendor advisories and patch information. Affected products include: Phpmyfaq Phpmyfaq.