Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27836: CWE-862: Missing Authorization in thorsten phpMyFAQ

0
High
VulnerabilityCVE-2026-27836cvecve-2026-27836cwe-862
Published: Fri Feb 27 2026 (02/27/2026, 19:54:51 UTC)
Source: CVE Database V5
Vendor/Project: thorsten
Product: phpMyFAQ

Description

phpMyFAQ is an open source FAQ web application. Prior to version 4.0.18, the WebAuthn prepare endpoint (`/api/webauthn/prepare`) creates new active user accounts without any authentication, CSRF protection, captcha, or configuration checks. This allows unauthenticated attackers to create unlimited user accounts even when registration is disabled. Version 4.0.18 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:18:59 UTC

Technical Analysis

phpMyFAQ is an open-source FAQ web application widely used for managing frequently asked questions on websites. The vulnerability identified as CVE-2026-27836 (CWE-862: Missing Authorization) affects phpMyFAQ versions earlier than 4.0.18. Specifically, the WebAuthn prepare endpoint located at `/api/webauthn/prepare` lacks any form of authorization, CSRF protection, captcha, or configuration validation. This endpoint is responsible for preparing WebAuthn credentials but, due to the missing authorization checks, allows unauthenticated attackers to create new active user accounts arbitrarily. Notably, this flaw persists even when the registration feature is disabled, effectively bypassing intended access controls. The vulnerability can be exploited remotely without any user interaction or privileges, making it highly accessible to attackers. While the vulnerability does not disclose sensitive information or disrupt service availability, it severely impacts the integrity of the system by enabling unauthorized account creation. Attackers could leverage this to flood the system with bogus accounts, potentially facilitating further attacks such as privilege escalation, spam, or denial of service through resource exhaustion. The issue was addressed and fixed in phpMyFAQ version 4.0.18, which introduced proper authorization checks and protections on the WebAuthn prepare endpoint. No known exploits are currently reported in the wild, but the ease of exploitation and high impact warrant immediate attention from users of affected versions.

Potential Impact

The primary impact of CVE-2026-27836 is on the integrity of phpMyFAQ installations, as unauthorized attackers can create unlimited active user accounts without authentication. This undermines trust in the user management system and can lead to several downstream risks, including privilege escalation if attackers manage to gain elevated roles via created accounts or exploit other vulnerabilities. The lack of registration restrictions can also result in spam accounts, cluttering the system and potentially degrading performance. Although confidentiality and availability are not directly affected, the integrity compromise can facilitate further attacks that may impact these areas. Organizations relying on phpMyFAQ for customer support, knowledge bases, or internal documentation may face operational disruptions and reputational damage if attackers abuse this vulnerability. The vulnerability’s remote and unauthenticated exploitability increases the risk of widespread abuse, especially in environments where phpMyFAQ is exposed to the internet. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks, particularly as details become more widely known.

Mitigation Recommendations

The most effective mitigation is to upgrade phpMyFAQ installations to version 4.0.18 or later, where the vulnerability is patched with proper authorization checks on the WebAuthn prepare endpoint. Until upgrading is possible, organizations should implement strict network-level access controls to restrict access to the vulnerable endpoint, such as IP whitelisting or web application firewall (WAF) rules that block unauthenticated requests to `/api/webauthn/prepare`. Monitoring and alerting on unusual account creation patterns can help detect exploitation attempts early. Disabling WebAuthn features if not in use can reduce the attack surface. Additionally, applying rate limiting on account creation endpoints can mitigate abuse. Reviewing and tightening user role assignments and permissions can limit the impact of unauthorized accounts. Finally, organizations should ensure that registration is properly disabled in configuration settings and verify that no other endpoints suffer from similar missing authorization issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.801Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1fa6032ffcdb8a26d1c5d

Added to database: 2/27/2026, 8:11:12 PM

Last enriched: 3/6/2026, 9:18:59 PM

Last updated: 4/14/2026, 12:55:00 AM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses