CVE-2026-24422: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in thorsten phpMyFAQ
phpMyFAQ is an open source FAQ web application. In versions 4.0.16 and below, multiple public API endpoints improperly expose sensitive user information due to insufficient access controls. The OpenQuestionController::list() endpoint calls Question::getAll() with showAll=true by default, returning records marked as non-public (isVisible=false) along with user email addresses, with similar exposures present in comment, news, and FAQ APIs. This information disclosure vulnerability could enable attackers to harvest email addresses for phishing campaigns or access content that was explicitly marked as private. This issue has been fixed in version 4.0.17.
AI Analysis
Technical Summary
phpMyFAQ is an open source FAQ management web application widely used for managing frequently asked questions and related content. In versions 4.0.16 and earlier, a critical design flaw exists in the public API endpoints, specifically in the OpenQuestionController::list() method. This endpoint internally calls Question::getAll() with the parameter showAll=true by default, which causes it to return all questions, including those marked as non-public (isVisible=false). Alongside the content, sensitive user information such as email addresses is also exposed. Similar issues are present in other API endpoints handling comments, news, and FAQ data. The root cause is insufficient access control checks on these API endpoints, allowing unauthenticated remote attackers to retrieve sensitive information without any privileges or user interaction. This exposure can facilitate targeted phishing campaigns by harvesting user emails and unauthorized access to content intended to be private. The vulnerability has been assigned CVE-2026-24422 and is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.3 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and limited confidentiality impact. The issue was resolved in phpMyFAQ version 4.0.17 by enforcing proper access controls on the affected API endpoints.
Potential Impact
For European organizations using phpMyFAQ versions prior to 4.0.17, this vulnerability poses a significant privacy risk. Exposure of user email addresses can lead to increased phishing attacks targeting employees or customers, potentially resulting in credential theft or social engineering compromises. Disclosure of non-public FAQ content may reveal sensitive internal information or business processes, undermining confidentiality and trust. Since the vulnerability is exploitable remotely without authentication, attackers can easily scan and harvest data from publicly accessible phpMyFAQ instances. This could also damage organizational reputation and lead to regulatory compliance issues under GDPR due to unauthorized exposure of personal data. The impact is particularly critical for sectors handling sensitive information such as government, healthcare, finance, and critical infrastructure within Europe.
Mitigation Recommendations
European organizations should immediately upgrade phpMyFAQ installations to version 4.0.17 or later, where the vulnerability is patched. If immediate upgrade is not feasible, restrict access to phpMyFAQ API endpoints by implementing network-level controls such as IP whitelisting or VPN access to limit exposure. Review and audit API access logs for suspicious activity indicating data harvesting attempts. Disable or restrict public API endpoints that are not essential. Implement web application firewalls (WAF) with custom rules to detect and block anomalous API requests targeting the affected endpoints. Conduct a thorough review of user data exposure and notify affected users if email addresses were compromised, following GDPR breach notification requirements. Regularly monitor vendor advisories for any updates or related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2026-24422: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in thorsten phpMyFAQ
Description
phpMyFAQ is an open source FAQ web application. In versions 4.0.16 and below, multiple public API endpoints improperly expose sensitive user information due to insufficient access controls. The OpenQuestionController::list() endpoint calls Question::getAll() with showAll=true by default, returning records marked as non-public (isVisible=false) along with user email addresses, with similar exposures present in comment, news, and FAQ APIs. This information disclosure vulnerability could enable attackers to harvest email addresses for phishing campaigns or access content that was explicitly marked as private. This issue has been fixed in version 4.0.17.
AI-Powered Analysis
Technical Analysis
phpMyFAQ is an open source FAQ management web application widely used for managing frequently asked questions and related content. In versions 4.0.16 and earlier, a critical design flaw exists in the public API endpoints, specifically in the OpenQuestionController::list() method. This endpoint internally calls Question::getAll() with the parameter showAll=true by default, which causes it to return all questions, including those marked as non-public (isVisible=false). Alongside the content, sensitive user information such as email addresses is also exposed. Similar issues are present in other API endpoints handling comments, news, and FAQ data. The root cause is insufficient access control checks on these API endpoints, allowing unauthenticated remote attackers to retrieve sensitive information without any privileges or user interaction. This exposure can facilitate targeted phishing campaigns by harvesting user emails and unauthorized access to content intended to be private. The vulnerability has been assigned CVE-2026-24422 and is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.3 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and limited confidentiality impact. The issue was resolved in phpMyFAQ version 4.0.17 by enforcing proper access controls on the affected API endpoints.
Potential Impact
For European organizations using phpMyFAQ versions prior to 4.0.17, this vulnerability poses a significant privacy risk. Exposure of user email addresses can lead to increased phishing attacks targeting employees or customers, potentially resulting in credential theft or social engineering compromises. Disclosure of non-public FAQ content may reveal sensitive internal information or business processes, undermining confidentiality and trust. Since the vulnerability is exploitable remotely without authentication, attackers can easily scan and harvest data from publicly accessible phpMyFAQ instances. This could also damage organizational reputation and lead to regulatory compliance issues under GDPR due to unauthorized exposure of personal data. The impact is particularly critical for sectors handling sensitive information such as government, healthcare, finance, and critical infrastructure within Europe.
Mitigation Recommendations
European organizations should immediately upgrade phpMyFAQ installations to version 4.0.17 or later, where the vulnerability is patched. If immediate upgrade is not feasible, restrict access to phpMyFAQ API endpoints by implementing network-level controls such as IP whitelisting or VPN access to limit exposure. Review and audit API access logs for suspicious activity indicating data harvesting attempts. Disable or restrict public API endpoints that are not essential. Implement web application firewalls (WAF) with custom rules to detect and block anomalous API requests targeting the affected endpoints. Conduct a thorough review of user data exposure and notify affected users if email addresses were compromised, following GDPR breach notification requirements. Regularly monitor vendor advisories for any updates or related vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-22T18:19:49.175Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6974300c4623b1157c786400
Added to database: 1/24/2026, 2:35:56 AM
Last enriched: 1/31/2026, 9:02:39 AM
Last updated: 2/7/2026, 3:47:38 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.