Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade phpmyfaq/phpmyfaq to version 4.0.14 or higher.
phpmyfaq/phpmyfaq is a FAQ system for PHP and MySQL, PostgreSQL and other databases
Affected versions of this package are vulnerable to SQL Injection in the update() method in Configuration.php. A user with 'Configuration Edit' permissions can execute arbitrary SQL commands by submitting crafted input for the $newConfigValues array, which is passed in as the name parameter. Successful exploitation can result in full compromise of the database, including reading, modifying, or deleting all data, and may potentially allow remote code execution depending on the database configuration.