thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) in FAQ comment username parameter
High severity
GitHub Reviewed
Published
Apr 5, 2023
to the GitHub Advisory Database
•
Updated Apr 11, 2023
Description
Published by the National Vulnerability Database
Apr 5, 2023
Published to the GitHub Advisory Database
Apr 5, 2023
Reviewed
Apr 5, 2023
Last updated
Apr 11, 2023
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the FAQ comment username parameter. This has been fixed in 3.1.12.
References