CVE-2026-45010
phpMyFAQ · phpMyFAQ
phpMyFAQ lacks rate limiting on its TOTP authentication endpoint, allowing unauthenticated attackers to brute-force two-factor authentication tokens.
Executive summary
A lack of rate limiting in the phpMyFAQ administrative login endpoint allows unauthenticated attackers to brute-force TOTP tokens and bypass two-factor authentication.
Vulnerability
The application fails to bind TOTP verification to a session or implement rate limiting on the /admin/check endpoint, permitting automated brute-force attacks against six-digit tokens.
Business impact
Bypassing two-factor authentication grants an attacker full administrative access, potentially leading to total system compromise and data loss. This vulnerability is rated 9.1, reflecting the high risk to administrative security.
Remediation
Immediate Action: Update phpMyFAQ to version 4.1.2 or later to implement necessary rate limiting and session binding.
Proactive Monitoring: Monitor authentication logs for high volumes of failed login attempts or sequential token submissions targeting the administrative interface.
Compensating Controls: Restrict access to the /admin/ path via IP allowlisting or VPN-only access to prevent public exposure.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Administrative access is the highest security tier; failing to protect this endpoint renders all other security measures ineffective. Update the software immediately to enforce robust authentication controls.