Home

Description

phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers can brute-force any user's six-digit TOTP code by submitting POST requests with sequential token values, bypassing two-factor authentication to gain full administrative access.

PUBLISHED Reserved 2026-05-08 | Published 2026-05-15 | Updated 2026-05-15 | Assigner VulnCheck




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Restriction of Excessive Authentication Attempts

Product status

Default status
unaffected

Any version before 4.1.2
affected

4.1.2 (semver)
unaffected

Credits

adrgs reporter

aisafe-bot finder

References

github.com/...pMyFAQ/security/advisories/GHSA-9pq7-mfwh-xx2j exploit

github.com/...pMyFAQ/security/advisories/GHSA-9pq7-mfwh-xx2j (GHSA Advisory GHSA-9pq7-mfwh-xx2j) vendor-advisory

www.vulncheck.com/...on-brute-force-via-admin-check-endpoint (VulnCheck Advisory: phpMyFAQ - Unauthenticated Two-Factor Authentication Brute-Force via /admin/check Endpoint) third-party-advisory

cve.org (CVE-2026-45010)

nvd.nist.gov (CVE-2026-45010)

Download JSON