Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. thorsten/phpmyfaq
  4. ›
  5. GHSA-xvp4-phqj-cjr3

GHSA-xvp4-phqj-cjr3: phpMyFAQ: IDOR Account Takeover

May 20, 2026

An Insecure Direct Object Reference (IDOR) vulnerability in phpMyFAQ’s Admin API allows any authenticated administrator to change the password of any user account, including SuperAdmin accounts (userId=1), without authorization verification. An attacker with a low-privilege admin account can escalate privileges to full SuperAdmin control by simply changing the target user’s ID in the API request body.

References

  • github.com/advisories/GHSA-xvp4-phqj-cjr3
  • github.com/thorsten/phpMyFAQ/security/advisories/GHSA-xvp4-phqj-cjr3

Code Behaviors & Features

Detect and mitigate GHSA-xvp4-phqj-cjr3 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.1.3

Fixed versions

  • 4.1.3

Solution

Upgrade to version 4.1.3 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-266: Incorrect Privilege Assignment
  • CWE-269: Improper Privilege Management
  • CWE-639: Authorization Bypass Through User-Controlled Key
  • CWE-862: Missing Authorization

Source file

packagist/thorsten/phpmyfaq/GHSA-xvp4-phqj-cjr3.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 21 May 2026 12:18:00 +0000.