Description
phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in FAQ creation and update endpoints that bypass sanitization through encode-decode cycles. The vulnerability allows authenticated attackers with FAQ_ADD permission to inject malicious script tags via question or answer parameters, which execute in every visitor's browser when FAQ content is rendered with the raw Twig filter.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Any version before 4.1.2
4.1.2 (semver)
Credits
offset
References
github.com/...pMyFAQ/security/advisories/GHSA-f5p7-2c9q-8896
github.com/...pMyFAQ/security/advisories/GHSA-f5p7-2c9q-8896 (GHSA Advisory GHSA-f5p7-2c9q-8896)
www.vulncheck.com/...uestion-answer-via-encode-decode-bypass (VulnCheck Advisory: phpMyFAQ - Stored XSS in FAQ Question/Answer via Encode-Decode Bypass)