CVE-2026-46364
phpMyFAQ · phpMyFAQ
phpMyFAQ contains an unauthenticated SQL injection vulnerability in its captcha handling methods, allowing attackers to extract sensitive database information.
Executive summary
An unauthenticated SQL injection vulnerability in phpMyFAQ allows attackers to extract sensitive data, including administrative tokens and credentials, from the backend database.
Vulnerability
The application fails to sanitize User-Agent headers before incorporating them into database queries, allowing unauthenticated attackers to perform time-based blind SQL injection.
Business impact
The exposure of administrative credentials and tokens enables full application takeover and sensitive data breach. A CVSS score of 9.8 highlights the critical danger of this unauthenticated data access.
Remediation
Immediate Action: Update phpMyFAQ to version 4.1.2 or later to patch the vulnerable captcha methods.
Proactive Monitoring: Monitor database query logs for time-intensive queries or patterns associated with SQL injection attempts.
Compensating Controls: Deploy a Web Application Firewall (WAF) with SQL injection protection rules to filter malicious User-Agent headers.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability provides a direct pathway to database compromise. Immediate patching is required to prevent unauthorized access to sensitive application data.