Description
phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event handlers, stealing admin session cookies and achieving full application takeover when visitors view affected FAQ pages.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
4.1.1 (semver) before 4.1.2
4.1.2 (semver)
Credits
ericliu-12
References
github.com/...pMyFAQ/security/advisories/GHSA-9525-27vj-c8r8
github.com/...pMyFAQ/security/advisories/GHSA-9525-27vj-c8r8 (GHSA Advisory GHSA-9525-27vj-c8r8)
www.vulncheck.com/...via-utils-parseurl-in-comment-rendering (VulnCheck Advisory: phpMyFAQ - Stored XSS via Utils::parseUrl() in Comment Rendering)