Vulnerability Description
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpmyfaq | Phpmyfaq | 3.2.5 |
Related Weaknesses (CWE)
References
- https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac89Patch
- https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822rExploitVendor Advisory
- https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac89Patch
- https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822rExploitVendor Advisory
FAQ
What is CVE-2024-28107?
CVE-2024-28107 is a vulnerability with a CVSS score of 8.8 (HIGH). phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modify...
How severe is CVE-2024-28107?
CVE-2024-28107 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-28107?
Check the references section above for vendor advisories and patch information. Affected products include: Phpmyfaq Phpmyfaq.