GHSA-9qv9-8xv6-5p35: Unauthenticated Password Reset and Enumeration Flaw in phpMyFAQ
Vulnerability ID: GHSA-9QV9-8XV6-5P35
CVSS Score: 7.0
Published: 2026-05-20
phpMyFAQ versions 4.1.2 and prior contain a critical logic flaw in the REST API password recovery mechanism. The endpoint processes password resets in a single, unauthenticated step, allowing remote attackers to forcefully change database credentials for arbitrary accounts while facilitating user enumeration through observable response discrepancies.
TL;DR
A weak password recovery mechanism in phpMyFAQ <= 4.1.2 allows unauthenticated attackers to force password resets for targeted users and enumerate valid accounts. The system immediately updates the database password upon receiving a matching username and email, bypassing standard token-based verification.
⚠️ Exploit Status: POC
Technical Details
- CVSS Score: 7.0 (High)
- Attack Vector: Network
- Privileges Required: None
- User Interaction: None
- CWE ID: CWE-640, CWE-204
- Exploit Status: Proof of Concept Available
Affected Systems
- phpMyFAQ REST API
- phpMyFAQ Frontend Controller
-
phpMyFAQ: <= 4.1.2 (Fixed in:
4.1.3)
Exploit Details
- Context Research: HTTP PUT request targeting /api/index.php/user/password/update with JSON body containing known username and email.
Mitigation Strategies
- Upgrade phpMyFAQ to version 4.1.3 or later.
- Implement strict rate limiting on unauthenticated REST API endpoints.
- Deploy Web Application Firewall (WAF) rules to restrict access to the
/api/index.php/user/password/updateendpoint.
Remediation Steps:
- Verify current phpMyFAQ installation version.
- Backup the phpMyFAQ database and file system.
- Download the official phpMyFAQ 4.1.3 release from the vendor repository.
- Apply the update following the official phpMyFAQ upgrade documentation.
- Verify the application REST API responses no longer exhibit differential behavior for invalid users.
References
- Official Advisory: phpMyFAQ Security Advisory 2026-05-14
- GitHub Advisory: GHSA-9qv9-8xv6-5p35
- OSV Data: GHSA-9qv9-8xv6-5p35
Read the full report for GHSA-9QV9-8XV6-5P35 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)