Vendor
phpMyFAQ SQL Injection via Unescaped OAuth Token
2 rules 1 TTPphpMyFAQ is vulnerable to SQL injection due to the `setTokenData` function failing to sanitize OAuth token fields from Azure AD JWT claims, potentially allowing attackers to execute arbitrary SQL commands via crafted Azure AD display names or custom claims.
phpMyFAQ Unauthenticated SQL Injection via User-Agent Header
2 rules 1 TTPUnauthenticated SQL injection vulnerability exists in phpMyFAQ <= 4.1.1 due to improper handling of the User-Agent header in BuiltinCaptcha, allowing attackers to inject malicious SQL payloads and potentially gain complete control of the datastore.
phpMyFAQ Unauthenticated FAQ Permission Bypass via Solution ID Enumeration
2 rules 1 TTPphpMyFAQ version 4.1.1 and earlier is vulnerable to an unauthenticated FAQ permission bypass, allowing attackers to enumerate solution IDs and discover restricted FAQ titles due to missing permission filters in key functions.
phpMyFAQ Unauthenticated 2FA Brute-Force Vulnerability
2 rules 1 TTP 1 IOCphpMyFAQ is vulnerable to an unauthenticated 2FA brute-force attack via the `/admin/check` endpoint, allowing attackers to bypass two-factor authentication and gain administrative access.
phpMyFAQ Stored XSS Vulnerability in Comment Rendering
2 rules 2 TTPs 1 IOCA stored XSS vulnerability in phpMyFAQ version 4.1.1 allows an authenticated user to inject JavaScript code into comments, leading to session cookie theft and potential admin account takeover when other users view the affected FAQ or News page.