Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. phpmyfaq/phpmyfaq
  4. ›
  5. CVE-2024-22202

CVE-2024-22202: Improper Access Control

February 5, 2024

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. phpMyFAQ’s user removal page allows an attacker to spoof another user’s detail, and in turn make a compelling phishing case for removing another user’s account. The front-end of this page does not allow changing the form details, an attacker can utilize a proxy to intercept this request and submit other data. Upon submitting this form, an email is sent to the administrator informing them that this user wants to delete their account. An administrator has no way of telling the difference between the actual user wishing to delete their account or the attacker issuing this for an account they do not control. This issue has been patched in version 3.2.5.

References

  • github.com/advisories/GHSA-6648-6g96-mg35
  • github.com/thorsten/phpMyFAQ/commit/1348dcecdaec5a5714ad567c16429432417b534d
  • github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6648-6g96-mg35
  • nvd.nist.gov/vuln/detail/CVE-2024-22202
  • www.phpmyfaq.de/security/advisory-2024-02-05

Code Behaviors & Features

Detect and mitigate CVE-2024-22202 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.2.5

Fixed versions

  • 3.2.5

Solution

Upgrade to version 3.2.5 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control

Source file

packagist/phpmyfaq/phpmyfaq/CVE-2024-22202.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:18 +0000.