CVE-2024-28106: phpMyFAQ Stored Cross-site Scripting at FAQ News Content
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.31166%
CWE
Published
3/25/2024
Updated
3/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
phpmyfaq/phpmyfaq | composer | = 3.2.5 | 3.2.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsanitized handling of the 'news' parameter in POST requests. The patch introduced a call to FaqHelper::cleanUpContent() in news.php, indicating the vulnerable code path was the news content processing flow prior to this sanitization step. While no specific function name is explicitly mentioned in the diff, the file-level modification in news.php and the XSS trigger mechanism confirm the vulnerability existed in the news content handling logic that lacked proper input sanitization.