CVE-2026-34973

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the searchCustomPages() method in phpmyfaq/src/phpMyFAQ/Search.php uses real_escape_string() (via escape()) to sanitize the search term before embedding it in LIKE clauses. However, real_escape_string() does not escape SQL LIKE metacharacters % (match any sequence) and _ (match any single character). An unauthenticated attacker can inject these wildcards into search queries, causing them to match unintended records — including content that was not meant to be surfaced — resulting in information disclosure. This issue has been patched in version 4.1.1.
CVSS

No CVSS.

Configurations

No configuration.

History

02 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 15:16

Updated : 2026-04-03 16:10


NVD link : CVE-2026-34973

Mitre link : CVE-2026-34973

CVE.ORG link : CVE-2026-34973


JSON object : View

Products Affected

No product.

CWE
CWE-943

Improper Neutralization of Special Elements in Data Query Logic