Vulnerability Description
phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenated with the base upload directory path without any path traversal validation. The FILTER_SANITIZE_SPECIAL_CHARS filter only encodes HTML special characters (&, ', ", <, >) and characters with ASCII value < 32, and does not prevent directory traversal sequences like ../. Additionally, the endpoint does not validate CSRF tokens, making it exploitable via CSRF attacks. This issue has been patched in version 4.1.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpmyfaq | Phpmyfaq | < 4.1.1 |
Related Weaknesses (CWE)
References
- https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1Product
- https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-38m8-xrfj-v38xExploitMitigationVendor Advisory
- https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-38m8-xrfj-v38xExploitMitigationVendor Advisory
FAQ
What is CVE-2026-34728?
CVE-2026-34728 is a vulnerability with a CVSS score of 8.7 (HIGH). phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered,...
How severe is CVE-2026-34728?
CVE-2026-34728 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34728?
Check the references section above for vendor advisories and patch information. Affected products include: Phpmyfaq Phpmyfaq.