CVE-2026-32629 PUBLISHED

phpMyFAQ: Stored XSS via Unsanitized Email Field in Admin FAQ Editor

Assigner: GitHub_M
Reserved: 12.03.2026 Published: 02.04.2026 Updated: 02.04.2026

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, an unauthenticated attacker can submit a guest FAQ with an email address that is syntactically valid per RFC 5321 (quoted local part) yet contains raw HTML — for example "<script>alert(1)</script>"@evil.com. PHP's FILTER_VALIDATE_EMAIL accepts this email as valid. The email is stored in the database without HTML sanitization and later rendered in the admin FAQ editor template using Twig's |raw filter, which bypasses auto-escaping entirely. This issue has been patched in version 4.1.1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:P
CVSS Score: 5.4

Product Status

Vendor thorsten
Product phpMyFAQ
Versions
  • Version < 4.1.1 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE