SQL injection in phpMyFAQ - #VU130113

 

SQL injection in phpMyFAQ - #VU130113

Published: May 5, 2026


Vulnerability identifier: #VU130113
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Thorsten Rinne
Affected software:
phpMyFAQ

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary SQL commands.

The vulnerability exists due to SQL injection in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() when handling unauthenticated GET requests to the public /api/captcha endpoint with a crafted User-Agent header. A remote attacker can send a specially crafted request with a malicious User-Agent header to execute arbitrary SQL commands.

The issue is reachable without authentication or user interaction, and the injected input reaches both a DELETE query and an INSERT query.


Remediation

Install security update from vendor's website.

Sources