Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68951: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thorsten phpMyFAQ

0
Medium
VulnerabilityCVE-2025-68951cvecve-2025-68951cwe-79
Published: Mon Dec 29 2025 (12/29/2025, 15:18:58 UTC)
Source: CVE Database V5
Vendor/Project: thorsten
Product: phpMyFAQ

Description

phpMyFAQ is an open source FAQ web application. Versions 4.0.14 and 4.0.15 have a stored cross-site scripting (XSS) vulnerability that allows an attacker to execute arbitrary JavaScript in an administrator’s browser by registering a user whose display name contains HTML entities. When an administrator views the admin user list, the payload is decoded server-side and rendered without escaping, resulting in script execution in the admin context. Version 4.0.16 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:40:37 UTC

Technical Analysis

phpMyFAQ is an open source FAQ web application widely used for managing frequently asked questions on websites. Versions 4.0.14 and 4.0.15 contain a stored cross-site scripting (XSS) vulnerability identified as CVE-2025-68951 (CWE-79). The vulnerability arises from improper neutralization of input during web page generation. Specifically, when a user registers with a display name containing malicious HTML entities, these entities are decoded server-side and rendered in the administrator’s user list page without proper escaping or sanitization. This allows an attacker to inject and execute arbitrary JavaScript code within the administrator’s browser context. Since the malicious script runs with admin privileges, it can potentially steal session cookies, perform actions on behalf of the admin, or pivot to other internal systems. Exploitation requires the attacker to register a user account with a crafted display name and relies on an administrator viewing the user list, which involves user interaction. The vulnerability does not require prior authentication to register but does require admin interaction to trigger. The issue is fixed in phpMyFAQ version 4.0.16. The CVSS 3.1 base score of 5.4 reflects network attack vector, low attack complexity, no privileges required, but user interaction is needed, and the impact is limited to confidentiality and integrity without availability impact. No known exploits are reported in the wild as of now.

Potential Impact

For European organizations using phpMyFAQ versions 4.0.14 or 4.0.15, this vulnerability poses a moderate risk. An attacker could leverage this XSS flaw to execute malicious scripts in the context of an administrator’s browser, potentially leading to session hijacking, unauthorized actions, or data leakage. This could compromise the confidentiality and integrity of the FAQ system and possibly other connected internal resources if the admin’s session is hijacked. Organizations relying on phpMyFAQ for internal knowledge bases or customer support might face reputational damage and operational disruption if attackers exploit this vulnerability. However, the impact is somewhat limited by the need for an attacker to register a user and for an administrator to view the user list, which may reduce the likelihood of exploitation. Since no known exploits are reported in the wild, the immediate threat level is moderate but should not be underestimated, especially in environments with high-value administrative access or sensitive information stored in phpMyFAQ.

Mitigation Recommendations

European organizations should promptly upgrade phpMyFAQ to version 4.0.16 or later, where the vulnerability is patched. Until the upgrade is applied, organizations can implement strict input validation and output encoding on user-supplied data, especially display names, to prevent HTML entity injection. Restricting registration capabilities or implementing CAPTCHA and email verification can reduce the risk of automated malicious registrations. Administrators should be cautious when viewing the user list and consider limiting access to this page to trusted personnel only. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly monitoring logs for suspicious user registrations or unusual admin page access patterns can help detect exploitation attempts. Finally, educating administrators about the risk and signs of XSS attacks will improve incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-26T16:46:17.499Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450badb813ff03e2bf7d2

Added to database: 12/30/2025, 10:22:50 PM

Last enriched: 12/30/2025, 11:40:37 PM

Last updated: 2/4/2026, 5:39:37 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats