phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.
History

Tue, 17 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-02-05T20:57:13.115Z

Updated: 2025-06-17T14:01:12.409Z

Reserved: 2024-01-25T15:09:40.211Z

Link: CVE-2024-24574

cve-icon Vulnrichment

Updated: 2024-08-01T23:19:52.930Z

cve-icon NVD

Status : Modified

Published: 2024-02-05T21:15:12.340

Modified: 2024-11-21T08:59:27.143

Link: CVE-2024-24574

cve-icon Redhat

No data.