phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the regex-based SVG sanitizer in phpMyFAQ (SvgSanitizer.php) can be bypassed using HTML entity encoding in javascript: URLs within SVG <a href> attributes. Any user with edit_faq permission can upload a malicious SVG that executes arbitrary JavaScript when viewed, enabling privilege escalation from editor to full admin takeover. This issue has been patched in version 4.1.1.
References
| Link | Resource |
|---|---|
| https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1 | Product |
| https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-5crx-pfhq-4hgg | Exploit Vendor Advisory |
| https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-5crx-pfhq-4hgg | Exploit Vendor Advisory |
Configurations
History
06 Apr 2026, 16:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:* | |
| References | () https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1 - Product | |
| References | () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-5crx-pfhq-4hgg - Exploit, Vendor Advisory | |
| First Time |
Phpmyfaq phpmyfaq
Phpmyfaq |
02 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-5crx-pfhq-4hgg - |
02 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 15:16
Updated : 2026-04-06 16:09
NVD link : CVE-2026-34974
Mitre link : CVE-2026-34974
CVE.ORG link : CVE-2026-34974
JSON object : View
Products Affected
phpmyfaq
- phpmyfaq
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
