Home

Description

phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in FAQ creation and update endpoints that bypass sanitization through encode-decode cycles. The vulnerability allows authenticated attackers with FAQ_ADD permission to inject malicious script tags via question or answer parameters, which execute in every visitor's browser when FAQ content is rendered with the raw Twig filter.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-15 | Updated 2026-05-15 | Assigner VulnCheck




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

Any version before 4.1.2
affected

4.1.2 (semver)
unaffected

Credits

offset reporter

References

github.com/...pMyFAQ/security/advisories/GHSA-f5p7-2c9q-8896 exploit

github.com/...pMyFAQ/security/advisories/GHSA-f5p7-2c9q-8896 (GHSA Advisory GHSA-f5p7-2c9q-8896) vendor-advisory

www.vulncheck.com/...uestion-answer-via-encode-decode-bypass (VulnCheck Advisory: phpMyFAQ - Stored XSS in FAQ Question/Answer via Encode-Decode Bypass) third-party-advisory

cve.org (CVE-2026-46363)

nvd.nist.gov (CVE-2026-46363)

Download JSON