CVE-2026-34729 PUBLISHED

phpMyFAQ: Stored XSS via Regex Bypass in Filter::removeAttributes()

Assigner: GitHub_M
Reserved: 30.03.2026 Published: 02.04.2026 Updated: 02.04.2026

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there is a stored XSS vulnerability via Regex Bypass in Filter::removeAttributes(). This issue has been patched in version 4.1.1.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
CVSS Score: 6.1

Product Status

Vendor thorsten
Product phpMyFAQ
Versions
  • Version < 4.1.1 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE