phpMyFAQ version 3.1.7 contains a Cross-Site Scripting (XSS) vulnerability.
This flaw phpMyFAQ version 3.1.7 contains a Cross-Site Scripting (XSS) vulnerability.
This flaw was identified in parameters that failed to properly sanitize user input. An attacker could inject malicious client-side scripts, such as JavaScript, into these fields.
When another user views a page displaying this unsanitized input (e.g., search results), the injected script executes within their browser's context. This enables various attacks, including session hijacking, defacing the web page, redirecting users to malicious sites, or stealing sensitive user data like cookies and credentials.
To mitigate this critical security risk, users are strongly advised to upgrade their phpMyFAQ installation to version 3.1.8 or later, which includes the necessary input sanitization fixes.
# Exploit Title: phpMyFAQ 3.1.7 - Reflected Cross-Site Scripting (XSS)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/thorsten/phpmyfaq/
# Software Link: https://github.com/thorsten/phpmyfaq/
# Version: 3.1.7
# Tested on: Windows
# CVE : CVE-2022-3766
Proof Of Concept
GET http://phpmyfaq1/index.php?action=main&search=%22%20onfocus%3D%22alert%281%29
Additional Conditions:
- Ensure that no security mechanisms (like a web application firewall) are blocking the specific request pattern.
- The application must be running a phpMyFAQ version prior to 3.1.8.
Steps to Reproduce
Log in phpmyfaq.
Send the request.
Observe the result
phpMyFAQ 3.1.7 Cross Site Scripting
- Details
- Written by: khalil shreateh
- Category: Vulnerabilities
- Hits: 121