Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j4rc-96xj-gvqc | phpMyFAQ: Public API endpoints expose emails and invisible questions |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thorsten
Thorsten phpmyfaq |
|
| Vendors & Products |
Thorsten
Thorsten phpmyfaq |
Sat, 24 Jan 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | phpMyFAQ is an open source FAQ web application. In versions 4.0.16 and below, multiple public API endpoints improperly expose sensitive user information due to insufficient access controls. The OpenQuestionController::list() endpoint calls Question::getAll() with showAll=true by default, returning records marked as non-public (isVisible=false) along with user email addresses, with similar exposures present in comment, news, and FAQ APIs. This information disclosure vulnerability could enable attackers to harvest email addresses for phishing campaigns or access content that was explicitly marked as private. This issue has been fixed in version 4.0.17. | |
| Title | phpMyFAQ: Public API endpoints expose emails and invisible questions | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-26T14:58:18.883Z
Reserved: 2026-01-22T18:19:49.175Z
Link: CVE-2026-24422
Updated: 2026-01-26T14:58:03.677Z
Status : Undergoing Analysis
Published: 2026-01-24T03:16:01.010
Modified: 2026-01-26T15:03:33.357
Link: CVE-2026-24422
No data.
OpenCVE Enrichment
Updated: 2026-01-26T11:48:42Z
Github GHSA