<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PhpMyFAQ (Prior to 4.1.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/phpmyfaq-prior-to-4.1.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 19:19:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/phpmyfaq-prior-to-4.1.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>phpMyFAQ Unauthenticated TOTP Bypass via Brute-Force (CVE-2026-45010)</title><link>https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-totp-bypass/</link><pubDate>Fri, 15 May 2026 19:19:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-phpmyfaq-totp-bypass/</guid><description>phpMyFAQ before 4.1.2 is vulnerable to improper restriction of excessive authentication attempts in the /admin/check endpoint, allowing unauthenticated attackers to brute-force any user's six-digit TOTP code and bypass two-factor authentication, potentially gaining full administrative access (CVE-2026-45010).</description><content:encoded><![CDATA[<p>phpMyFAQ before version 4.1.2 is susceptible to an improper restriction of excessive authentication attempts. The vulnerability resides in the <code>/admin/check</code> endpoint, which lacks session binding and rate limiting. This endpoint accepts arbitrary user-id parameters, allowing unauthenticated attackers to target specific user accounts. By sending a series of POST requests with sequential token values, an attacker can brute-force the six-digit TOTP code of any user, effectively bypassing two-factor authentication. Successful exploitation allows the attacker to gain full administrative privileges within the phpMyFAQ application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a phpMyFAQ instance running a version prior to 4.1.2.</li>
<li>The attacker sends a POST request to <code>/admin/check</code> without any authentication.</li>
<li>The POST request includes a <code>user-id</code> parameter specifying the target user account.</li>
<li>The POST request also includes a <code>token</code> parameter containing a potential TOTP value.</li>
<li>The attacker iterates through a range of six-digit numerical values for the <code>token</code> parameter.</li>
<li>The server processes each request without rate limiting or session validation.</li>
<li>Upon successful brute-force of the correct TOTP, the server grants administrative access.</li>
<li>The attacker leverages the administrative access to modify data, create new accounts, or otherwise compromise the phpMyFAQ installation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack allows an unauthenticated attacker to gain full administrative access to the phpMyFAQ application. This can lead to complete compromise of the application&rsquo;s data, including sensitive information stored within the FAQ system. The attacker can also create new administrative accounts, further solidifying their control over the system. The potential impact includes data breaches, defacement, and denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade phpMyFAQ to version 4.1.2 or later to patch CVE-2026-45010.</li>
<li>Implement rate limiting on the <code>/admin/check</code> endpoint to prevent brute-force attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect phpMyFAQ TOTP Brute-Force Attempts&rdquo; to identify potential brute-force attacks against the <code>/admin/check</code> endpoint.</li>
<li>Monitor web server logs for unusual activity targeting the <code>/admin/check</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>brute-force</category><category>totp</category><category>phpMyFAQ</category><category>credential-access</category><category>authentication-bypass</category></item></channel></rss>