CVE-2024-27300

CVSS 3.1 Score 5.5 of 10 (medium)

Details

Published Mar 25, 2024
Updated: Mar 26, 2024
CWE ID 79

Summary

CVE-2024-27300 is a vulnerability in phpMyFAQ, an open-source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL, and other databases. The vulnerability exists in the "email" field in phpMyFAQ's user control panel page and allows for stored cross-site scripting (XSS) attacks. This is due to the inadequacy of PHP's FILTER_VALIDATE_EMAIL function, which only validates the email format but not its content. Exploiting this vulnerability enables an attacker to execute arbitrary client-side JavaScript within another user's phpMyFAQ session. The issue has been fixed in version 3.2.6 of phpMyFAQ. The severity of this vulnerability is rated as MEDIUM with a base score of 5.5 according to CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-27300 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions