CVE-2025-68951: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thorsten phpMyFAQ
phpMyFAQ is an open source FAQ web application. Versions 4.0.14 and 4.0.15 have a stored cross-site scripting (XSS) vulnerability that allows an attacker to execute arbitrary JavaScript in an administrator’s browser by registering a user whose display name contains HTML entities. When an administrator views the admin user list, the payload is decoded server-side and rendered without escaping, resulting in script execution in the admin context. Version 4.0.16 contains a patch for the issue.
AI Analysis
Technical Summary
phpMyFAQ is an open source FAQ web application widely used for managing frequently asked questions on websites. Versions 4.0.14 and 4.0.15 contain a stored cross-site scripting (XSS) vulnerability identified as CVE-2025-68951 (CWE-79). The vulnerability arises from improper neutralization of input during web page generation. Specifically, when a user registers with a display name containing malicious HTML entities, these entities are decoded server-side and rendered in the administrator’s user list page without proper escaping or sanitization. This allows an attacker to inject and execute arbitrary JavaScript code within the administrator’s browser context. Since the malicious script runs with admin privileges, it can potentially steal session cookies, perform actions on behalf of the admin, or pivot to other internal systems. Exploitation requires the attacker to register a user account with a crafted display name and relies on an administrator viewing the user list, which involves user interaction. The vulnerability does not require prior authentication to register but does require admin interaction to trigger. The issue is fixed in phpMyFAQ version 4.0.16. The CVSS 3.1 base score of 5.4 reflects network attack vector, low attack complexity, no privileges required, but user interaction is needed, and the impact is limited to confidentiality and integrity without availability impact. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations using phpMyFAQ versions 4.0.14 or 4.0.15, this vulnerability poses a moderate risk. An attacker could leverage this XSS flaw to execute malicious scripts in the context of an administrator’s browser, potentially leading to session hijacking, unauthorized actions, or data leakage. This could compromise the confidentiality and integrity of the FAQ system and possibly other connected internal resources if the admin’s session is hijacked. Organizations relying on phpMyFAQ for internal knowledge bases or customer support might face reputational damage and operational disruption if attackers exploit this vulnerability. However, the impact is somewhat limited by the need for an attacker to register a user and for an administrator to view the user list, which may reduce the likelihood of exploitation. Since no known exploits are reported in the wild, the immediate threat level is moderate but should not be underestimated, especially in environments with high-value administrative access or sensitive information stored in phpMyFAQ.
Mitigation Recommendations
European organizations should promptly upgrade phpMyFAQ to version 4.0.16 or later, where the vulnerability is patched. Until the upgrade is applied, organizations can implement strict input validation and output encoding on user-supplied data, especially display names, to prevent HTML entity injection. Restricting registration capabilities or implementing CAPTCHA and email verification can reduce the risk of automated malicious registrations. Administrators should be cautious when viewing the user list and consider limiting access to this page to trusted personnel only. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly monitoring logs for suspicious user registrations or unusual admin page access patterns can help detect exploitation attempts. Finally, educating administrators about the risk and signs of XSS attacks will improve incident response readiness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-68951: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thorsten phpMyFAQ
Description
phpMyFAQ is an open source FAQ web application. Versions 4.0.14 and 4.0.15 have a stored cross-site scripting (XSS) vulnerability that allows an attacker to execute arbitrary JavaScript in an administrator’s browser by registering a user whose display name contains HTML entities. When an administrator views the admin user list, the payload is decoded server-side and rendered without escaping, resulting in script execution in the admin context. Version 4.0.16 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
phpMyFAQ is an open source FAQ web application widely used for managing frequently asked questions on websites. Versions 4.0.14 and 4.0.15 contain a stored cross-site scripting (XSS) vulnerability identified as CVE-2025-68951 (CWE-79). The vulnerability arises from improper neutralization of input during web page generation. Specifically, when a user registers with a display name containing malicious HTML entities, these entities are decoded server-side and rendered in the administrator’s user list page without proper escaping or sanitization. This allows an attacker to inject and execute arbitrary JavaScript code within the administrator’s browser context. Since the malicious script runs with admin privileges, it can potentially steal session cookies, perform actions on behalf of the admin, or pivot to other internal systems. Exploitation requires the attacker to register a user account with a crafted display name and relies on an administrator viewing the user list, which involves user interaction. The vulnerability does not require prior authentication to register but does require admin interaction to trigger. The issue is fixed in phpMyFAQ version 4.0.16. The CVSS 3.1 base score of 5.4 reflects network attack vector, low attack complexity, no privileges required, but user interaction is needed, and the impact is limited to confidentiality and integrity without availability impact. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations using phpMyFAQ versions 4.0.14 or 4.0.15, this vulnerability poses a moderate risk. An attacker could leverage this XSS flaw to execute malicious scripts in the context of an administrator’s browser, potentially leading to session hijacking, unauthorized actions, or data leakage. This could compromise the confidentiality and integrity of the FAQ system and possibly other connected internal resources if the admin’s session is hijacked. Organizations relying on phpMyFAQ for internal knowledge bases or customer support might face reputational damage and operational disruption if attackers exploit this vulnerability. However, the impact is somewhat limited by the need for an attacker to register a user and for an administrator to view the user list, which may reduce the likelihood of exploitation. Since no known exploits are reported in the wild, the immediate threat level is moderate but should not be underestimated, especially in environments with high-value administrative access or sensitive information stored in phpMyFAQ.
Mitigation Recommendations
European organizations should promptly upgrade phpMyFAQ to version 4.0.16 or later, where the vulnerability is patched. Until the upgrade is applied, organizations can implement strict input validation and output encoding on user-supplied data, especially display names, to prevent HTML entity injection. Restricting registration capabilities or implementing CAPTCHA and email verification can reduce the risk of automated malicious registrations. Administrators should be cautious when viewing the user list and consider limiting access to this page to trusted personnel only. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly monitoring logs for suspicious user registrations or unusual admin page access patterns can help detect exploitation attempts. Finally, educating administrators about the risk and signs of XSS attacks will improve incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-26T16:46:17.499Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695450badb813ff03e2bf7d2
Added to database: 12/30/2025, 10:22:50 PM
Last enriched: 12/30/2025, 11:40:37 PM
Last updated: 2/4/2026, 5:39:37 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67850: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67849: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67848: Improper Handling of Insufficient Permissions or Privileges
HighCVE-2025-29867: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Hancom Inc. Hancom Office 2018
HighCVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.