Ad

CVE-2026-34728

HIGH CVSS 3.1: 8.1 EPSS 0.07%
Updated Apr 07, 2026
Phpmyfaq
Parameter Value
CVSS 8.1 (HIGH)
Affected Versions before 4.1.1
Fixed In 4.1.1
Type CWE-22 (Path Traversal)
Vendor Phpmyfaq
Public PoC No

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenated with the base upload directory path without any path traversal validation.

The FILTER_SANITIZE_SPECIAL_CHARS filter only encodes HTML special characters (&, ', ", <, >) and characters with ASCII value < 32, and does not prevent directory traversal sequences like ../. Additionally, the endpoint does not validate CSRF tokens, making it exploitable via CSRF attacks. This issue has been patched in version 4.1.1.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
None
No data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Phpmyfaq Phpmyfaq
cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*
4.1.1