CVE-2026-24422

phpMyFAQ is an open source FAQ web application. In versions 4.0.16 and below, multiple public API endpoints improperly expose sensitive user information due to insufficient access controls. The OpenQuestionController::list() endpoint calls Question::getAll() with showAll=true by default, returning records marked as non-public (isVisible=false) along with user email addresses, with similar exposures present in comment, news, and FAQ APIs. This information disclosure vulnerability could enable attackers to harvest email addresses for phishing campaigns or access content that was explicitly marked as private. This issue has been fixed in version 4.0.17.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*

History

28 Jan 2026, 18:10

Type Values Removed Values Added
CPE cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*
First Time Phpmyfaq phpmyfaq
Phpmyfaq
CWE NVD-CWE-noinfo
References () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-j4rc-96xj-gvqc - () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-j4rc-96xj-gvqc - Exploit, Vendor Advisory

24 Jan 2026, 03:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-24 03:16

Updated : 2026-01-28 18:10


NVD link : CVE-2026-24422

Mitre link : CVE-2026-24422

CVE.ORG link : CVE-2026-24422


JSON object : View

Products Affected

phpmyfaq

  • phpmyfaq
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo