CVE-2026-27836: CWE-862: Missing Authorization in thorsten phpMyFAQ
CVE-2026-27836 is a high-severity vulnerability in phpMyFAQ versions prior to 4. 0. 18, where the WebAuthn prepare endpoint allows unauthenticated attackers to create unlimited user accounts without any authentication or protective checks. This missing authorization flaw (CWE-862) enables attackers to bypass registration restrictions, potentially leading to account abuse and integrity compromise. The vulnerability does not impact confidentiality or availability directly but can severely affect the integrity of user management. Exploitation requires no privileges or user interaction and can be performed remotely over the network. The issue was fixed in version 4. 0. 18. Organizations using vulnerable versions should upgrade immediately and consider additional access controls to mitigate risks.
AI Analysis
Technical Summary
phpMyFAQ is an open-source FAQ web application widely used for managing frequently asked questions on websites. Versions prior to 4.0.18 contain a critical vulnerability identified as CVE-2026-27836, classified under CWE-862 (Missing Authorization). The vulnerability exists in the WebAuthn prepare endpoint located at `/api/webauthn/prepare`. This endpoint is responsible for preparing WebAuthn authentication but, due to missing authorization checks, allows unauthenticated attackers to create new active user accounts without any form of authentication, CSRF protection, CAPTCHA, or configuration validation. Even if user registration is disabled, attackers can exploit this flaw to create an unlimited number of accounts. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This means the flaw can be exploited remotely without authentication or user interaction, primarily compromising the integrity of the user database by unauthorized account creation. Although no known exploits are currently reported in the wild, the flaw poses a significant risk to organizations relying on phpMyFAQ for user management and content delivery. The issue was addressed and fixed in phpMyFAQ version 4.0.18.
Potential Impact
The primary impact of this vulnerability is on the integrity of the phpMyFAQ user management system. Attackers can create unlimited unauthorized user accounts, potentially leading to abuse such as privilege escalation attempts, spam, or unauthorized access to restricted content if combined with other vulnerabilities. While confidentiality and availability are not directly affected, the presence of unauthorized accounts can undermine trust in the system and complicate administrative oversight. Organizations using vulnerable versions may face increased risk of account-based attacks, fraudulent activity, and potential reputational damage. The ease of exploitation and lack of required privileges or user interaction make this vulnerability particularly dangerous in public-facing deployments. Additionally, automated exploitation could lead to resource exhaustion or denial of service indirectly by overwhelming the system with bogus accounts.
Mitigation Recommendations
The most effective mitigation is to upgrade phpMyFAQ to version 4.0.18 or later, where the vulnerability is fixed. Until upgrading is possible, organizations should implement strict network-level access controls to restrict access to the `/api/webauthn/prepare` endpoint, such as IP whitelisting or web application firewall (WAF) rules that detect and block suspicious account creation attempts. Administrators should also review user registration settings and monitor logs for unusual spikes in account creation activity. Implementing additional authentication or CAPTCHA mechanisms at the application or proxy level can help prevent automated abuse. Regularly auditing user accounts and removing suspicious or unauthorized accounts will reduce risk. Finally, organizations should stay informed about updates from the phpMyFAQ project and apply security patches promptly.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, India, Brazil, Japan
CVE-2026-27836: CWE-862: Missing Authorization in thorsten phpMyFAQ
Description
CVE-2026-27836 is a high-severity vulnerability in phpMyFAQ versions prior to 4. 0. 18, where the WebAuthn prepare endpoint allows unauthenticated attackers to create unlimited user accounts without any authentication or protective checks. This missing authorization flaw (CWE-862) enables attackers to bypass registration restrictions, potentially leading to account abuse and integrity compromise. The vulnerability does not impact confidentiality or availability directly but can severely affect the integrity of user management. Exploitation requires no privileges or user interaction and can be performed remotely over the network. The issue was fixed in version 4. 0. 18. Organizations using vulnerable versions should upgrade immediately and consider additional access controls to mitigate risks.
AI-Powered Analysis
Technical Analysis
phpMyFAQ is an open-source FAQ web application widely used for managing frequently asked questions on websites. Versions prior to 4.0.18 contain a critical vulnerability identified as CVE-2026-27836, classified under CWE-862 (Missing Authorization). The vulnerability exists in the WebAuthn prepare endpoint located at `/api/webauthn/prepare`. This endpoint is responsible for preparing WebAuthn authentication but, due to missing authorization checks, allows unauthenticated attackers to create new active user accounts without any form of authentication, CSRF protection, CAPTCHA, or configuration validation. Even if user registration is disabled, attackers can exploit this flaw to create an unlimited number of accounts. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This means the flaw can be exploited remotely without authentication or user interaction, primarily compromising the integrity of the user database by unauthorized account creation. Although no known exploits are currently reported in the wild, the flaw poses a significant risk to organizations relying on phpMyFAQ for user management and content delivery. The issue was addressed and fixed in phpMyFAQ version 4.0.18.
Potential Impact
The primary impact of this vulnerability is on the integrity of the phpMyFAQ user management system. Attackers can create unlimited unauthorized user accounts, potentially leading to abuse such as privilege escalation attempts, spam, or unauthorized access to restricted content if combined with other vulnerabilities. While confidentiality and availability are not directly affected, the presence of unauthorized accounts can undermine trust in the system and complicate administrative oversight. Organizations using vulnerable versions may face increased risk of account-based attacks, fraudulent activity, and potential reputational damage. The ease of exploitation and lack of required privileges or user interaction make this vulnerability particularly dangerous in public-facing deployments. Additionally, automated exploitation could lead to resource exhaustion or denial of service indirectly by overwhelming the system with bogus accounts.
Mitigation Recommendations
The most effective mitigation is to upgrade phpMyFAQ to version 4.0.18 or later, where the vulnerability is fixed. Until upgrading is possible, organizations should implement strict network-level access controls to restrict access to the `/api/webauthn/prepare` endpoint, such as IP whitelisting or web application firewall (WAF) rules that detect and block suspicious account creation attempts. Administrators should also review user registration settings and monitor logs for unusual spikes in account creation activity. Implementing additional authentication or CAPTCHA mechanisms at the application or proxy level can help prevent automated abuse. Regularly auditing user accounts and removing suspicious or unauthorized accounts will reduce risk. Finally, organizations should stay informed about updates from the phpMyFAQ project and apply security patches promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T02:32:39.801Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a1fa6032ffcdb8a26d1c5d
Added to database: 2/27/2026, 8:11:12 PM
Last enriched: 2/27/2026, 8:25:37 PM
Last updated: 2/27/2026, 10:36:20 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28414: CWE-36: Absolute Path Traversal in gradio-app gradio
HighCVE-2026-27939: CWE-287: Improper Authentication in statamic cms
HighCVE-2026-28416: CWE-918: Server-Side Request Forgery (SSRF) in gradio-app gradio
HighCVE-2026-28415: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gradio-app gradio
MediumCVE-2026-28411: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.