Home

Description

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the searchCustomPages() method in phpmyfaq/src/phpMyFAQ/Search.php uses real_escape_string() (via escape()) to sanitize the search term before embedding it in LIKE clauses. However, real_escape_string() does not escape SQL LIKE metacharacters % (match any sequence) and _ (match any single character). An unauthenticated attacker can inject these wildcards into search queries, causing them to match unintended records — including content that was not meant to be surfaced — resulting in information disclosure. This issue has been patched in version 4.1.1.

PUBLISHED Reserved 2026-03-31 | Published 2026-04-02 | Updated 2026-04-03 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-943: Improper Neutralization of Special Elements in Data Query Logic

Product status

< 4.1.1
affected

References

github.com/...pMyFAQ/security/advisories/GHSA-gcp9-5jc8-976x

github.com/thorsten/phpMyFAQ/releases/tag/4.1.1

cve.org (CVE-2026-34973)

nvd.nist.gov (CVE-2026-34973)

Download JSON