CVE-2024-28105

Source
https://cve.org/CVERecord?id=CVE-2024-28105
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28105.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28105
Aliases
Published
2024-03-25T18:35:05.202Z
Modified
2026-02-18T07:35:59.820521Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
phpMyFAQ's File Upload Bypass at Category Image Leads to RCE
Details

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The category image upload function in phpmyfaq is vulnerable to manipulation of the Content-type and lang parameters, allowing attackers to upload malicious files with a .php extension, potentially leading to remote code execution (RCE) on the system. This vulnerability is fixed in 3.2.6.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-434"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/28xxx/CVE-2024-28105.json"
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28105.json"