CVE-2023-1757: thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via FAQ News link parameter
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.24556%
CWE
Published
4/5/2023
Updated
4/6/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
thorsten/phpmyfaq | composer | < 3.1.12 | 3.1.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from improper input sanitization and output encoding. The commit diff shows that in News.php, the 'linkTitle' field was not escaped with Strings::htmlentities() before being rendered, directly enabling XSS. Additionally, the form handling code in admin/news.php initially used insufficient input filters (FILTER_SANITIZE_SPECIAL_CHARS/FILTER_UNSAFE_RAW) for the 'link' parameter, but this code is procedural and lacks a named function. The most clearly identifiable vulnerable function is getNews, where missing output encoding directly caused the XSS.