CVSS 3.1 Score 8.8 of 10 (high)


Published Mar 25, 2024
Updated: Mar 26, 2024


A SQL injection vulnerability, identified as CVE-2024-27299, has been discovered in phpMyFAQ version 3.2.5. This vulnerability affects the "Add News" functionality of the open source FAQ web application for PHP 8.1+ and databases like MySQL and PostgreSQL. It occurs due to improper escaping of the email address in the "authorEmail" field, which utilizes PHP's FILTER_VALIDATE_EMAIL filter that is insufficient in defending against SQL injection attacks. Exploiting this vulnerability allows an authenticated user with add/edit permissions to potentially exfiltrate data, take over accounts, or even achieve remote code execution (RCE). To remediate this issue, it is recommended to upgrade to the fixed version 3.2.6 of phpMyFAQ.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-27299 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options