Miggo Logo

CVE-2023-0788: Code Injection in thorsten/phpmyfaq

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.30849%
Published
2/12/2023
Updated
2/23/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
thorsten/phpmyfaqcomposer< 3.1.113.1.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper sanitization of the 'question' parameter in ajaxservice.php. The commit patching the issue added a strip_tags call to sanitize the input, indicating the original code lacked proper filtering. The use of FILTER_UNSAFE_RAW (which explicitly does not sanitize) for user-controlled input created a code injection vector. The combination of unsanitized input and later unsafe usage (e.g., in templates, database operations, or eval-like contexts) aligns with the CWE-94 code injection pattern.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*o** Inj**tion in *it*u* r*pository t*orst*n/p*pmy**q prior to *.*.**.

Reasoning

T** vuln*r**ility st*ms *rom improp*r s*nitiz*tion o* t** 'qu*stion' p*r*m*t*r in *j*xs*rvi**.p*p. T** *ommit p*t**in* t** issu* ***** * `strip_t**s` **ll to s*nitiz* t** input, in*i**tin* t** ori*in*l *o** l**k** prop*r *ilt*rin*. T** us* o* *ILT*R_