
Cloud Vulnerability DB
A community-led vulnerabilities database
A Code Injection vulnerability was identified in GitHub repository thorsten/phpmyfaq versions prior to 3.1.11, tracked as CVE-2023-0788. The vulnerability was discovered and disclosed on February 12, 2023 (CVE Details).
The vulnerability was related to insufficient input sanitization in the question handling functionality of phpMyFAQ. The fix involved implementing proper sanitization by adding strip_tags() function to clean user input for questions, as evidenced in the commit (GitHub Commit).
The vulnerability could potentially allow attackers to inject malicious code through the question submission functionality, potentially compromising the security of the phpMyFAQ installation (CVE Details).
The vulnerability was patched in version 3.1.11 of phpMyFAQ. Users are advised to upgrade to this version or later to mitigate the risk. The fix involves adding proper input sanitization using the strip_tags() function (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."