Home

Description

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, an unauthenticated attacker can submit a guest FAQ with an email address that is syntactically valid per RFC 5321 (quoted local part) yet contains raw HTML — for example "<script>alert(1)</script>"@evil.com. PHP's FILTER_VALIDATE_EMAIL accepts this email as valid. The email is stored in the database without HTML sanitization and later rendered in the admin FAQ editor template using Twig's |raw filter, which bypasses auto-escaping entirely. This issue has been patched in version 4.1.1.

PUBLISHED Reserved 2026-03-12 | Published 2026-04-02 | Updated 2026-04-02 | Assigner GitHub_M




MEDIUM: 5.4CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:P

Problem types

CWE-20: Improper Input Validation

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 4.1.1
affected

References

github.com/...pMyFAQ/security/advisories/GHSA-98gw-w575-h2ph exploit

github.com/...pMyFAQ/security/advisories/GHSA-98gw-w575-h2ph

github.com/thorsten/phpMyFAQ/releases/tag/4.1.1

cve.org (CVE-2026-32629)

nvd.nist.gov (CVE-2026-32629)

Download JSON