CVE-2023-0306: phpMyFAQ Stored Cross-site Scripting vulnerability
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.24242%
CWE
Published
1/16/2023
Updated
1/23/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| thorsten/phpmyfaq | composer | < 3.1.10 | 3.1.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The patch adds HTML entity escaping to multiple output locations. The vulnerable functions were identified by analyzing where raw user-controlled data (FAQ entries, titles, tags) was directly embedded in HTML contexts without proper sanitization. Class methods like Faq::getLatest and Tags rendering methods were clearly vulnerable because they handled user-generated content and passed it to templates without encoding. The admin interface scripts (record.edit.php/record.show.php) also contained vulnerable outputs, but these were template-level injections rather than discrete functions.