<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PhpMyFAQ &lt; 4.1.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/phpmyfaq--4.1.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 19:20:47 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/phpmyfaq--4.1.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>phpMyFAQ Stored XSS Vulnerability via Malformed URLs (CVE-2026-46367)</title><link>https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-xss/</link><pubDate>Fri, 15 May 2026 19:20:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-xss/</guid><description>phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments, potentially leading to session hijacking and application takeover.</description><content:encoded><![CDATA[<p>phpMyFAQ before version 4.1.2 is vulnerable to stored cross-site scripting (XSS) in the <code>Utils::parseUrl()</code> function. The vulnerability, identified as CVE-2026-46367, allows authenticated users to inject arbitrary JavaScript code into comments by crafting malformed URLs containing unescaped quotes. When other users, including administrators, view the FAQ pages containing the malicious comments, the injected JavaScript executes in their browsers. This can lead to the theft of sensitive information like admin session cookies, ultimately enabling full application takeover. The vulnerability was reported by VulnCheck and affects deployments where user comments are enabled and not properly sanitized.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the phpMyFAQ application with a valid user account.</li>
<li>Attacker crafts a malicious URL containing unescaped quotes and JavaScript code (e.g., <code>&lt;a href=&quot;javascript:alert('XSS')&quot;&gt;Click Here&lt;/a&gt;</code>).</li>
<li>Attacker submits a comment containing the crafted malicious URL to a FAQ page.</li>
<li>The phpMyFAQ application stores the comment, including the malicious URL, in the database without proper sanitization or escaping.</li>
<li>A victim user (including an administrator) views the FAQ page containing the attacker&rsquo;s comment.</li>
<li>The phpMyFAQ application renders the FAQ page, embedding the malicious URL within the HTML.</li>
<li>The victim&rsquo;s web browser parses the HTML and executes the injected JavaScript code from the malicious URL.</li>
<li>The attacker&rsquo;s JavaScript code steals the victim&rsquo;s session cookies and sends them to an attacker-controlled server, allowing session hijacking.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability (CVE-2026-46367) can lead to the theft of administrator session cookies, resulting in a complete takeover of the phpMyFAQ application. An attacker could then modify FAQs, inject further malicious code, or compromise sensitive data stored within the application. The severity is rated as HIGH with a CVSS v3.1 score of 7.6. The number of victims depends on the number of users who view the FAQ pages containing the injected malicious URLs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade phpMyFAQ to version 4.1.2 or later to patch the CVE-2026-46367 vulnerability.</li>
<li>Implement proper input validation and sanitization in the <code>Utils::parseUrl()</code> function to prevent the injection of malicious JavaScript code, specifically escaping single and double quotes.</li>
<li>Deploy the Sigma rule <code>Detect phpMyFAQ XSS in FAQ Comments</code> to identify potential exploitation attempts.</li>
<li>Regularly review user-submitted content (comments, URLs) for suspicious patterns or malicious code.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>stored-xss</category><category>xss</category><category>phpmyfaq</category></item></channel></rss>