Tag
phpMyFAQ SQL Injection via Unescaped OAuth Token
2 rules 1 TTPphpMyFAQ is vulnerable to SQL injection due to the `setTokenData` function failing to sanitize OAuth token fields from Azure AD JWT claims, potentially allowing attackers to execute arbitrary SQL commands via crafted Azure AD display names or custom claims.
phpMyFAQ Unauthenticated FAQ Permission Bypass via Solution ID Enumeration
2 rules 1 TTPphpMyFAQ version 4.1.1 and earlier is vulnerable to an unauthenticated FAQ permission bypass, allowing attackers to enumerate solution IDs and discover restricted FAQ titles due to missing permission filters in key functions.
phpMyFAQ Unauthenticated 2FA Brute-Force Vulnerability
2 rules 1 TTP 1 IOCphpMyFAQ is vulnerable to an unauthenticated 2FA brute-force attack via the `/admin/check` endpoint, allowing attackers to bypass two-factor authentication and gain administrative access.
phpMyFAQ Stored XSS Vulnerability in Comment Rendering
2 rules 2 TTPs 1 IOCA stored XSS vulnerability in phpMyFAQ version 4.1.1 allows an authenticated user to inject JavaScript code into comments, leading to session cookie theft and potential admin account takeover when other users view the affected FAQ or News page.