CVE-2024-27299
CVSS 3.1 Score 8.8 of 10 (high)
Details
Summary
A SQL injection vulnerability, identified as CVE-2024-27299, has been discovered in phpMyFAQ version 3.2.5. This vulnerability affects the "Add News" functionality of the open source FAQ web application for PHP 8.1+ and databases like MySQL and PostgreSQL. It occurs due to improper escaping of the email address in the "authorEmail" field, which utilizes PHP's FILTER_VALIDATE_EMAIL filter that is insufficient in defending against SQL injection attacks. Exploiting this vulnerability allows an authenticated user with add/edit permissions to potentially exfiltrate data, take over accounts, or even achieve remote code execution (RCE). To remediate this issue, it is recommended to upgrade to the fixed version 3.2.6 of phpMyFAQ.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions