SQL injection in phpMyFAQ - #VU130113
Published: May 5, 2026
phpMyFAQ
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary SQL commands.
The vulnerability exists due to SQL injection in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() when handling unauthenticated GET requests to the public /api/captcha endpoint with a crafted User-Agent header. A remote attacker can send a specially crafted request with a malicious User-Agent header to execute arbitrary SQL commands.
The issue is reachable without authentication or user interaction, and the injected input reaches both a DELETE query and an INSERT query.