CVE-2023-0788: Code Injection in thorsten/phpmyfaq
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.30849%
CWE
Published
2/12/2023
Updated
2/23/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| thorsten/phpmyfaq | composer | < 3.1.11 | 3.1.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper sanitization of the 'question' parameter in ajaxservice.php. The commit patching the issue added a strip_tags call to sanitize the input, indicating the original code lacked proper filtering. The use of FILTER_UNSAFE_RAW (which explicitly does not sanitize) for user-controlled input created a code injection vector. The combination of unsanitized input and later unsafe usage (e.g., in templates, database operations, or eval-like contexts) aligns with the CWE-94 code injection pattern.