Description
phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers can brute-force any user's six-digit TOTP code by submitting POST requests with sequential token values, bypassing two-factor authentication to gain full administrative access.
Problem types
Improper Restriction of Excessive Authentication Attempts
Product status
Any version before 4.1.2
4.1.2 (semver)
Credits
adrgs
aisafe-bot
References
github.com/...pMyFAQ/security/advisories/GHSA-9pq7-mfwh-xx2j
github.com/...pMyFAQ/security/advisories/GHSA-9pq7-mfwh-xx2j (GHSA Advisory GHSA-9pq7-mfwh-xx2j)
www.vulncheck.com/...on-brute-force-via-admin-check-endpoint (VulnCheck Advisory: phpMyFAQ - Unauthenticated Two-Factor Authentication Brute-Force via /admin/check Endpoint)