CVE-2024-55889:
thorsten/phpmyfaq Unintended File Download Triggered by Embedded Frames
4.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71699%
CWE
Published
12/13/2024
Updated
12/13/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
thorsten/phpmyfaq | composer | < 3.2.10 | 3.2.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient access control in FAQ record retrieval. The commit diff shows modifications to the SQL query in getRecordBySolutionId()
to add proper group/user permission checks. Originally, the query did not correctly validate()
if a user had rights to access the FAQ record, allowing embedded iframes with attachment URLs to execute in unauthorized contexts. By fixing the permission checks in this function, the patch prevents unauthorized users from loading FAQ records containing malicious iframe triggers, addressing the root cause of the unintended download behavior.