Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-27300
HistoryMar 25, 2024 - 6:30 p.m.

CVE-2024-27300 phpMyFAQ Stored XSS at user email

2024-03-2518:30:35
CWE-79
GitHub_M
github.com
phpmyfaq
stored xss
vulnerability
php 8.1
mysql
postgresql
user control panel
email field
filter_validate_email
javascript
3.2.6

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

AI Score

6.3

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The email field in phpMyFAQ’s user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP’s FILTER_VALIDATE_EMAIL function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user’s phpMyFAQ session. This vulnerability is fixed in 3.2.6.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:thorsten:phpmyfaq:*:*:*:*:*:*:*:*"
    ],
    "vendor": "thorsten",
    "product": "phpmyfaq",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "3.2.6",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

AI Score

6.3

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-27300