Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-38m8-xrfj-v38x | phpMyFAQ: Path Traversal - Arbitrary File Deletion in MediaBrowserController |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thorsten
Thorsten phpmyfaq |
|
| Vendors & Products |
Thorsten
Thorsten phpmyfaq |
|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenated with the base upload directory path without any path traversal validation. The FILTER_SANITIZE_SPECIAL_CHARS filter only encodes HTML special characters (&, ', ", <, >) and characters with ASCII value < 32, and does not prevent directory traversal sequences like ../. Additionally, the endpoint does not validate CSRF tokens, making it exploitable via CSRF attacks. This issue has been patched in version 4.1.1. | |
| Title | phpMyFAQ: Path Traversal - Arbitrary File Deletion in MediaBrowserController | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T15:24:02.916Z
Reserved: 2026-03-30T18:41:20.754Z
Link: CVE-2026-34728
Updated: 2026-04-02T15:23:52.055Z
Status : Received
Published: 2026-04-02T15:16:41.770
Modified: 2026-04-02T16:16:24.403
Link: CVE-2026-34728
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:20:55Z
Github GHSA