Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27836: CWE-862: Missing Authorization in thorsten phpMyFAQ

0
High
VulnerabilityCVE-2026-27836cvecve-2026-27836cwe-862
Published: Fri Feb 27 2026 (02/27/2026, 19:54:51 UTC)
Source: CVE Database V5
Vendor/Project: thorsten
Product: phpMyFAQ

Description

CVE-2026-27836 is a high-severity vulnerability in phpMyFAQ versions prior to 4. 0. 18, where the WebAuthn prepare endpoint allows unauthenticated attackers to create unlimited user accounts without any authentication or protective checks. This missing authorization flaw (CWE-862) enables attackers to bypass registration restrictions, potentially leading to account abuse and integrity compromise. The vulnerability does not impact confidentiality or availability directly but can severely affect the integrity of user management. Exploitation requires no privileges or user interaction and can be performed remotely over the network. The issue was fixed in version 4. 0. 18. Organizations using vulnerable versions should upgrade immediately and consider additional access controls to mitigate risks.

AI-Powered Analysis

AILast updated: 02/27/2026, 20:25:37 UTC

Technical Analysis

phpMyFAQ is an open-source FAQ web application widely used for managing frequently asked questions on websites. Versions prior to 4.0.18 contain a critical vulnerability identified as CVE-2026-27836, classified under CWE-862 (Missing Authorization). The vulnerability exists in the WebAuthn prepare endpoint located at `/api/webauthn/prepare`. This endpoint is responsible for preparing WebAuthn authentication but, due to missing authorization checks, allows unauthenticated attackers to create new active user accounts without any form of authentication, CSRF protection, CAPTCHA, or configuration validation. Even if user registration is disabled, attackers can exploit this flaw to create an unlimited number of accounts. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This means the flaw can be exploited remotely without authentication or user interaction, primarily compromising the integrity of the user database by unauthorized account creation. Although no known exploits are currently reported in the wild, the flaw poses a significant risk to organizations relying on phpMyFAQ for user management and content delivery. The issue was addressed and fixed in phpMyFAQ version 4.0.18.

Potential Impact

The primary impact of this vulnerability is on the integrity of the phpMyFAQ user management system. Attackers can create unlimited unauthorized user accounts, potentially leading to abuse such as privilege escalation attempts, spam, or unauthorized access to restricted content if combined with other vulnerabilities. While confidentiality and availability are not directly affected, the presence of unauthorized accounts can undermine trust in the system and complicate administrative oversight. Organizations using vulnerable versions may face increased risk of account-based attacks, fraudulent activity, and potential reputational damage. The ease of exploitation and lack of required privileges or user interaction make this vulnerability particularly dangerous in public-facing deployments. Additionally, automated exploitation could lead to resource exhaustion or denial of service indirectly by overwhelming the system with bogus accounts.

Mitigation Recommendations

The most effective mitigation is to upgrade phpMyFAQ to version 4.0.18 or later, where the vulnerability is fixed. Until upgrading is possible, organizations should implement strict network-level access controls to restrict access to the `/api/webauthn/prepare` endpoint, such as IP whitelisting or web application firewall (WAF) rules that detect and block suspicious account creation attempts. Administrators should also review user registration settings and monitor logs for unusual spikes in account creation activity. Implementing additional authentication or CAPTCHA mechanisms at the application or proxy level can help prevent automated abuse. Regularly auditing user accounts and removing suspicious or unauthorized accounts will reduce risk. Finally, organizations should stay informed about updates from the phpMyFAQ project and apply security patches promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.801Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1fa6032ffcdb8a26d1c5d

Added to database: 2/27/2026, 8:11:12 PM

Last enriched: 2/27/2026, 8:25:37 PM

Last updated: 2/27/2026, 10:36:20 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses