<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Phpmyfaq &lt; 4.1.3 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/phpmyfaq--4.1.3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 15:50:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/phpmyfaq--4.1.3/feed.xml" rel="self" type="application/rss+xml"/><item><title>phpMyFAQ Authentication Bypass Allows Account Takeover</title><link>https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-account-takeover/</link><pubDate>Wed, 20 May 2026 15:50:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-account-takeover/</guid><description>An authentication bypass vulnerability in phpMyFAQ allows an unauthenticated attacker to reset the password of any user account, including SuperAdmin accounts, by sending a PUT request with a valid username and associated email address to /api/user/password/update, resulting in complete account takeover.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability exists in phpMyFAQ versions prior to 4.1.3. This flaw allows an unauthenticated attacker to reset the password of any user account, including those with SuperAdmin privileges. The vulnerability stems from the lack of proper password reset token verification, rate limiting, and email confirmation in the <code>/api/user/password/update</code> endpoint. By crafting a simple PUT request containing a valid username and associated email address, an attacker can trigger the system to generate a new plaintext password and transmit it to the user&rsquo;s email address, effectively granting them complete control over the targeted account. This poses a significant risk to organizations using phpMyFAQ for knowledge management and support purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target phpMyFAQ instance.</li>
<li>The attacker sends a PUT request to <code>/phpmyfaq/api/user/password/update</code> with a valid username and incorrect email address to determine if the username exists (username enumeration).</li>
<li>If the response indicates the username exists, the attacker sends another PUT request to <code>/phpmyfaq/api/user/password/update</code> with the valid username and associated email address in the JSON body.</li>
<li>The phpMyFAQ application, lacking proper authentication, processes the request without requiring any token verification, rate limiting, or email confirmation.</li>
<li>The application generates a new plaintext password for the specified user account.</li>
<li>The application sends the new plaintext password to the user&rsquo;s email address.</li>
<li>The attacker intercepts the email containing the new password.</li>
<li>The attacker uses the new password to log in to the phpMyFAQ application and take complete control of the account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain full administrative access to a phpMyFAQ installation. This includes the ability to access and modify sensitive information, such as user data and FAQ content. An attacker can also lock out legitimate users, disrupt service availability, and potentially use the compromised system as a platform for further malicious activities. All phpMyFAQ administrators and end-users are potentially impacted, especially those using default installations. The attack has very low complexity, requiring no special knowledge beyond identifying a valid username and associated email address.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade phpMyFAQ to version 4.1.3 or later to patch the vulnerability as detailed in <a href="https://github.com/advisories/GHSA-w9xh-5f39-vq89">GHSA-w9xh-5f39-vq89</a>.</li>
<li>Deploy the Sigma rule <code>Detect phpMyFAQ Password Reset Exploit</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement rate limiting on the <code>/api/user/password/update</code> endpoint to prevent username/email enumeration attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>account-takeover</category><category>phpmyfaq</category><category>web-application</category></item><item><title>phpMyFAQ Unauthenticated Password Reset Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-password-reset/</link><pubDate>Wed, 20 May 2026 15:47:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-password-reset/</guid><description>phpMyFAQ versions prior to 4.1.3 are vulnerable to an unauthenticated password reset vulnerability that allows attackers to enumerate valid accounts and forcibly change user passwords by exploiting the password reset API without token validation.</description><content:encoded><![CDATA[<p>phpMyFAQ versions prior to 4.1.3 are vulnerable to an unauthenticated password reset vulnerability. The vulnerability resides in the password reset API, which lacks proper authentication and authorization checks. An attacker can exploit this by sending a crafted request to the <code>/api/index.php/user/password/update</code> endpoint with a valid username and email combination. Upon receiving this request, the application immediately generates a new password, updates the user&rsquo;s account, and sends the new password to the user&rsquo;s email address. This bypasses the intended password reset flow, allowing attackers to forcibly change passwords without any out-of-band confirmation or token validation. This issue was confirmed in a local Docker deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a potential target username and email address.</li>
<li>The attacker crafts a PUT request to <code>/api/index.php/user/password/update</code> with the target&rsquo;s username and email in the JSON body.</li>
<li>The phpMyFAQ application receives the request at <code>phpmyfaq/src/phpMyFAQ/Controller/Frontend/Api/UnauthorizedUserController.php</code>.</li>
<li>The application checks if the provided username and email combination exists.</li>
<li>If the username and email are valid, the application generates a new password.</li>
<li>The application updates the user&rsquo;s password in the database with the newly generated password.</li>
<li>The application sends the new password to the user&rsquo;s email address.</li>
<li>The attacker has now forced a password reset, effectively locking the user out of their account using the original password.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The unauthenticated password reset vulnerability in phpMyFAQ allows attackers to enumerate valid usernames and email addresses. More critically, it enables attackers to forcibly reset user passwords, leading to account disruption and potential denial of service. An attacker knowing a valid username/email pair can trigger an immediate password change without any confirmation, invalidating the old password. While the attacker might not gain immediate access to the account if they lack access to the email, the forced password reset disrupts the victim&rsquo;s access and could lead to further exploitation if the attacker can intercept the new password.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the provided patch or upgrade to phpMyFAQ version 4.1.3 or later to remediate the vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect phpMyFAQ Password Reset Attempt</code> to monitor for suspicious PUT requests to the password update endpoint.</li>
<li>Implement rate limiting on the <code>/api/index.php/user/password/update</code> endpoint to mitigate brute-force attempts to enumerate valid username/email pairs.</li>
<li>Change the password recovery flow to a token-based design as outlined in the source document, generating reset tokens and validating those tokens before resetting the password.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>phpMyFAQ</category><category>password-reset</category><category>account-enumeration</category></item><item><title>phpMyFAQ IDOR Allows Admin Account Takeover</title><link>https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-idor/</link><pubDate>Wed, 20 May 2026 15:47:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-idor/</guid><description>An IDOR vulnerability in phpMyFAQ's Admin API allows any authenticated administrator to change the password of any user account, including SuperAdmin accounts, without authorization verification, leading to privilege escalation.</description><content:encoded><![CDATA[<p>An Insecure Direct Object Reference (IDOR) vulnerability exists in phpMyFAQ versions prior to 4.1.3. The vulnerability is located in the Admin API within the <code>overwritePassword()</code> method, which lacks proper authorization checks. Any authenticated administrator, even those with low privileges (USER_EDIT permission), can change the password of any user account, including the SuperAdmin account (userId=1). By manipulating the <code>userId</code> parameter in a PUT request to <code>/admin/api/user/overwrite-password</code>, an attacker can escalate their privileges to full SuperAdmin control. This poses a significant risk to organizations with multiple admin users and environments requiring privilege separation or multi-tenancy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to a low-privilege admin account, either through legitimate means or by exploiting a separate vulnerability.</li>
<li>The attacker identifies the <code>overwritePassword()</code> endpoint <code>/admin/api/user/overwrite-password</code> and its lack of authorization checks.</li>
<li>The attacker requests a CSRF token from an admin page using <code>curl</code> and <code>grep</code>.</li>
<li>The attacker crafts a PUT request to the <code>/admin/api/user/overwrite-password</code> endpoint. The request body includes a JSON payload with the target <code>userId</code> set to &lsquo;1&rsquo; (SuperAdmin), a valid CSRF token, and the desired new password for the SuperAdmin account.</li>
<li>The phpMyFAQ application receives the PUT request and, due to the IDOR vulnerability, does not validate whether the requesting admin has permission to modify the target user&rsquo;s password.</li>
<li>The <code>overwritePassword()</code> method changes the SuperAdmin&rsquo;s password to the attacker-supplied password.</li>
<li>The attacker logs in as the SuperAdmin using the newly set password.</li>
<li>The attacker now has full control of the phpMyFAQ application and can perform any administrative task.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this IDOR vulnerability allows an attacker to gain complete control of the phpMyFAQ application. This can lead to data breaches, defacement of the FAQ content, and unauthorized modification of system configurations. Organizations with multiple admin users, where not all should have SuperAdmin access, are particularly vulnerable. In multi-tenant environments, this vulnerability could allow an attacker to compromise all tenants managed by the phpMyFAQ instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade phpMyFAQ to version 4.1.3 or later to patch the IDOR vulnerability.</li>
<li>Implement the Sigma rule <code>Detect phpMyFAQ Admin Password Overwrite</code> to detect potential exploitation attempts (see below).</li>
<li>Review and restrict admin privileges based on the principle of least privilege to limit the impact of potential account compromises.</li>
<li>Enable multi-factor authentication for all admin accounts to further mitigate the risk of unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phpMyFAQ</category><category>IDOR</category><category>privilege-escalation</category><category>account-takeover</category></item></channel></rss>