phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an <iframe> element without user interaction or explicit consent. Version 3.2.10 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/thorsten/phpMyFAQ/commit/fa0f7368dc3288eedb1915def64ef8fb270f711d | Patch |
| https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-m3r7-8gw7-qwvc | Exploit Vendor Advisory |
| https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-m3r7-8gw7-qwvc | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-12-13 14:15
Updated : 2025-08-14 18:56
NVD link : CVE-2024-55889
Mitre link : CVE-2024-55889
CVE.ORG link : CVE-2024-55889
JSON object : View
Products Affected
phpmyfaq
- phpmyfaq
CWE
CWE-451
User Interface (UI) Misrepresentation of Critical Information
