phpMyFAQ Unauthenticated TOTP Bypass via Brute-Force (CVE-2026-45010)
phpMyFAQ before 4.1.2 is vulnerable to improper restriction of excessive authentication attempts in the /admin/check endpoint, allowing unauthenticated attackers to brute-force any user's six-digit TOTP code and bypass two-factor authentication, potentially gaining full administrative access (CVE-2026-45010).
phpMyFAQ before version 4.1.2 is susceptible to an improper restriction of excessive authentication attempts. The vulnerability resides in the /admin/check endpoint, which lacks session binding and rate limiting. This endpoint accepts arbitrary user-id parameters, allowing unauthenticated attackers to target specific user accounts. By sending a series of POST requests with sequential token values, an attacker can brute-force the six-digit TOTP code of any user, effectively bypassing two-factor authentication. Successful exploitation allows the attacker to gain full administrative privileges within the phpMyFAQ application.
Attack Chain
- The attacker identifies a phpMyFAQ instance running a version prior to 4.1.2.
- The attacker sends a POST request to
/admin/checkwithout any authentication. - The POST request includes a
user-idparameter specifying the target user account. - The POST request also includes a
tokenparameter containing a potential TOTP value. - The attacker iterates through a range of six-digit numerical values for the
tokenparameter. - The server processes each request without rate limiting or session validation.
- Upon successful brute-force of the correct TOTP, the server grants administrative access.
- The attacker leverages the administrative access to modify data, create new accounts, or otherwise compromise the phpMyFAQ installation.
Impact
A successful attack allows an unauthenticated attacker to gain full administrative access to the phpMyFAQ application. This can lead to complete compromise of the application’s data, including sensitive information stored within the FAQ system. The attacker can also create new administrative accounts, further solidifying their control over the system. The potential impact includes data breaches, defacement, and denial of service.
Recommendation
- Upgrade phpMyFAQ to version 4.1.2 or later to patch CVE-2026-45010.
- Implement rate limiting on the
/admin/checkendpoint to prevent brute-force attacks. - Deploy the Sigma rule “Detect phpMyFAQ TOTP Brute-Force Attempts” to identify potential brute-force attacks against the
/admin/checkendpoint. - Monitor web server logs for unusual activity targeting the
/admin/checkendpoint.
Detection coverage 2
Detect phpMyFAQ TOTP Brute-Force Attempts
highDetects CVE-2026-45010 exploitation — Excessive POST requests to /admin/check endpoint indicating potential TOTP brute-force
Detect phpMyFAQ admin/check endpoint access
mediumDetects access to /admin/check from suspicious client IP addresses that are not commonly seen.
Detection queries are available on the platform. Get full rules →