CVE-2023-0880: Misinterpretation of Input in thorsten/phpmyfaq
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.17187%
CWE
Published
2/17/2023
Updated
2/28/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
thorsten/phpmyfaq | composer | < 3.1.11 | 3.1.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the lack of input trimming in ajaxservice.php
. The patch adds trim()
to user inputs like 'name', 'email', and 'question' to prevent whitespace-only values. The original code processed these inputs via Filter::filterInput
and other sanitization steps but did not trim leading/trailing whitespace. This allowed attackers to submit questions/answers with only spaces, bypassing validation. The vulnerable code resides in the procedural input-handling blocks of ajaxservice.php
(e.g., under 'savequestion' and 'save' actions), where untrimmed inputs were directly used.