CVSS 3.1 Score 5.5 of 10 (medium)


Published Mar 25, 2024
Updated: Mar 26, 2024


CVE-2024-27300 is a vulnerability in phpMyFAQ, an open-source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL, and other databases. The vulnerability exists in the "email" field in phpMyFAQ's user control panel page and allows for stored cross-site scripting (XSS) attacks. This is due to the inadequacy of PHP's FILTER_VALIDATE_EMAIL function, which only validates the email format but not its content. Exploiting this vulnerability enables an attacker to execute arbitrary client-side JavaScript within another user's phpMyFAQ session. The issue has been fixed in version 3.2.6 of phpMyFAQ. The severity of this vulnerability is rated as MEDIUM with a base score of 5.5 according to CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-27300 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options