Miggo Logo

CVE-2018-16650: phpMyFAQ CSRF

8.8

CVSS Score
3.0

Basic Information

EPSS Score
0.37779%
Published
5/14/2022
Updated
10/6/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
thorsten/phpmyfaqcomposer< 2.9.112.9.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

CSRF vulnerabilities in admin interfaces typically occur in state-changing operations that lack anti-CSRF token validation(). The advisory explicitly mentions admin-privileged CSRF and report generation flaws, indicating unprotected admin endpoints. While exact function names aren't provided in available resources, the pattern of vulnerability (missing CSRF checks in admin actions) and phpMyFAQ's architecture suggest these handlers in admin/*.php files were vulnerable. Confidence is medium due to lack of direct code references, but aligns with CSRF vulnerability patterns and advisory context.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

p*pMy**Q ***or* *.*.** *llows *SR*.

Reasoning

*SR* vuln*r**iliti*s in **min int*r****s typi**lly o**ur in st*t*-***n*in* op*r*tions t**t l**k *nti-*SR* tok*n `v*li**tion()`. T** **visory *xpli*itly m*ntions **min-privil**** *SR* *n* r*port **n*r*tion *l*ws, in*i**tin* unprot**t** **min *n*points