CVE-2026-24422: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in thorsten phpMyFAQ
CVE-2026-24422 is a medium severity information disclosure vulnerability in phpMyFAQ versions 4. 0. 16 and below. Multiple public API endpoints, including OpenQuestionController::list(), improperly expose sensitive user data such as email addresses and non-public content due to insufficient access controls. This flaw allows attackers to harvest emails for phishing or access private FAQ content. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. It has been fixed in version 4. 0. 17. European organizations using vulnerable phpMyFAQ versions risk targeted phishing and privacy breaches.
AI Analysis
Technical Summary
phpMyFAQ is an open-source FAQ management system widely used for publishing frequently asked questions and related content. In versions 4.0.16 and earlier, a critical design flaw exists in multiple public API endpoints, notably the OpenQuestionController::list() method. This endpoint calls the Question::getAll() function with the parameter showAll=true by default, which causes it to return all questions, including those marked as non-public (isVisible=false). Alongside the content, sensitive user information such as email addresses is also exposed. Similar exposure issues exist in other API endpoints handling comments, news, and FAQ data. The root cause is insufficient access control checks on these API endpoints, allowing unauthenticated attackers to retrieve data that should be restricted. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). Exploitation requires no privileges or user interaction and can be performed remotely over the network. The CVSS 3.1 base score is 5.3 (medium), reflecting the ease of exploitation and limited impact on confidentiality (only email addresses and non-public content are exposed, but no integrity or availability impact). The issue was publicly disclosed and fixed in phpMyFAQ version 4.0.17, which properly restricts access to sensitive data. No known active exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a significant privacy and security risk. Exposure of user email addresses can facilitate targeted phishing campaigns, social engineering attacks, and spam, potentially leading to credential theft or malware infections. Disclosure of non-public FAQ content may reveal internal knowledge, policies, or sensitive operational information, undermining confidentiality and trust. Organizations relying on phpMyFAQ for customer support or internal knowledge bases may suffer reputational damage if private data is leaked. Since the vulnerability requires no authentication and is remotely exploitable, attackers can easily scan for vulnerable instances across Europe. The impact is particularly critical for sectors handling sensitive customer data or regulated information, such as finance, healthcare, and government agencies. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone warrants prompt remediation.
Mitigation Recommendations
The primary mitigation is to upgrade all phpMyFAQ installations to version 4.0.17 or later, where the access control issues have been fixed. Organizations should audit their current phpMyFAQ version deployments and prioritize patching vulnerable instances. Additionally, review and tighten API endpoint access controls to ensure sensitive data is not exposed to unauthenticated users. Implement network-level protections such as web application firewalls (WAFs) to monitor and block suspicious API requests targeting these endpoints. Conduct regular security assessments and penetration tests focusing on API security. Educate users and administrators about phishing risks stemming from leaked email addresses. Where upgrading is temporarily not feasible, restrict access to the FAQ application via IP whitelisting or VPNs to limit exposure. Finally, monitor logs for unusual access patterns that may indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2026-24422: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in thorsten phpMyFAQ
Description
CVE-2026-24422 is a medium severity information disclosure vulnerability in phpMyFAQ versions 4. 0. 16 and below. Multiple public API endpoints, including OpenQuestionController::list(), improperly expose sensitive user data such as email addresses and non-public content due to insufficient access controls. This flaw allows attackers to harvest emails for phishing or access private FAQ content. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. It has been fixed in version 4. 0. 17. European organizations using vulnerable phpMyFAQ versions risk targeted phishing and privacy breaches.
AI-Powered Analysis
Technical Analysis
phpMyFAQ is an open-source FAQ management system widely used for publishing frequently asked questions and related content. In versions 4.0.16 and earlier, a critical design flaw exists in multiple public API endpoints, notably the OpenQuestionController::list() method. This endpoint calls the Question::getAll() function with the parameter showAll=true by default, which causes it to return all questions, including those marked as non-public (isVisible=false). Alongside the content, sensitive user information such as email addresses is also exposed. Similar exposure issues exist in other API endpoints handling comments, news, and FAQ data. The root cause is insufficient access control checks on these API endpoints, allowing unauthenticated attackers to retrieve data that should be restricted. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). Exploitation requires no privileges or user interaction and can be performed remotely over the network. The CVSS 3.1 base score is 5.3 (medium), reflecting the ease of exploitation and limited impact on confidentiality (only email addresses and non-public content are exposed, but no integrity or availability impact). The issue was publicly disclosed and fixed in phpMyFAQ version 4.0.17, which properly restricts access to sensitive data. No known active exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a significant privacy and security risk. Exposure of user email addresses can facilitate targeted phishing campaigns, social engineering attacks, and spam, potentially leading to credential theft or malware infections. Disclosure of non-public FAQ content may reveal internal knowledge, policies, or sensitive operational information, undermining confidentiality and trust. Organizations relying on phpMyFAQ for customer support or internal knowledge bases may suffer reputational damage if private data is leaked. Since the vulnerability requires no authentication and is remotely exploitable, attackers can easily scan for vulnerable instances across Europe. The impact is particularly critical for sectors handling sensitive customer data or regulated information, such as finance, healthcare, and government agencies. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone warrants prompt remediation.
Mitigation Recommendations
The primary mitigation is to upgrade all phpMyFAQ installations to version 4.0.17 or later, where the access control issues have been fixed. Organizations should audit their current phpMyFAQ version deployments and prioritize patching vulnerable instances. Additionally, review and tighten API endpoint access controls to ensure sensitive data is not exposed to unauthenticated users. Implement network-level protections such as web application firewalls (WAFs) to monitor and block suspicious API requests targeting these endpoints. Conduct regular security assessments and penetration tests focusing on API security. Educate users and administrators about phishing risks stemming from leaked email addresses. Where upgrading is temporarily not feasible, restrict access to the FAQ application via IP whitelisting or VPNs to limit exposure. Finally, monitor logs for unusual access patterns that may indicate exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-22T18:19:49.175Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6974300c4623b1157c786400
Added to database: 1/24/2026, 2:35:56 AM
Last enriched: 1/24/2026, 2:50:27 AM
Last updated: 1/24/2026, 3:42:18 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24469: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frustratedProton http-server
HighCVE-2026-24420: CWE-284: Improper Access Control in thorsten phpMyFAQ
MediumCVE-2025-13952: CWE - CWE-416: Use After Free (4.18) in Imagination Technologies Graphics DDK
HighCVE-2026-24421: CWE-862: Missing Authorization in thorsten phpMyFAQ
MediumCVE-2026-24412: CWE-20: Improper Input Validation in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.