CVE-2023-0793:
Weak Password Requirements in thorsten/phpmyfaq
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.28272%
CWE
Published
2/12/2023
Updated
2/24/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
thorsten/phpmyfaq | composer | < 3.1.11 | 3.1.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from insufficient server-side password validation. The patch added critical password length checks in phpmyfaq/admin/ajax.user.php:
- In user creation flow: Added check for strlen() > 7 when automaticPassword is disabled
- In password update flow: Added check for strlen() > 7 for new passwords These missing checks in the server-side request handlers (processing POST data for user management) directly enabled weak password acceptance. Client-side changes in user.js and user.php (minlength=8) were insufficient as they could be bypassed, making the server-side validation gap the root cause.