Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yd2pwLXc3ZzctaDYzcc4AAyj0
thorsten/phpmyfaq vulnerable to improper access control
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to improper access control when FAQ News is marked as inactive in settings and have comments enabled, allowing comments to be posted on inactive FAQs. This has been fixed in 3.1.12.
Permalink: https://github.com/advisories/GHSA-2wjp-w7g7-h63qJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yd2pwLXc3ZzctaDYzcc4AAyj0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: almost 2 years ago
CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
EPSS Percentage: 0.00081
EPSS Percentile: 0.36516
Identifiers: GHSA-2wjp-w7g7-h63q, CVE-2023-1883
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-1883
- https://github.com/thorsten/phpmyfaq/commit/db77df888178766987398597d4f153831c62a503
- https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191
- https://github.com/advisories/GHSA-2wjp-w7g7-h63q
Blast Radius: 3.3
Affected Packages
packagist:thorsten/phpmyfaq
Dependent packages: 0Dependent repositories: 4
Downloads: 35 total
Affected Version Ranges: < 3.1.12
Fixed in: 3.1.12
All affected versions: 2.8.0, 2.8.1, 2.8.2, 2.8.3, 2.8.4, 2.8.5, 2.8.6, 2.8.7, 2.8.8, 2.8.9, 2.8.10, 2.8.11, 2.8.12, 2.8.13, 2.8.14, 2.8.15, 2.8.16, 2.8.17, 2.8.18, 2.8.19, 2.8.20, 2.8.21, 2.8.22, 2.8.23, 2.8.24, 2.8.25, 2.8.26, 2.8.27, 2.8.28, 2.8.29, 2.9.0, 2.9.1, 2.9.2, 2.9.3, 2.9.4, 2.9.5, 2.9.6, 2.9.7, 2.9.8, 2.9.9, 2.9.10, 2.9.11, 2.9.12, 2.9.13, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.1.10, 3.1.11
All unaffected versions: 3.1.12, 3.1.13, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.2.5, 3.2.6, 3.2.7, 3.2.8, 3.2.9, 3.2.10, 4.0.0, 4.0.1, 4.0.2, 4.0.3