CSV Injection Affecting thorsten/phpmyfaq package, versions <3.1.16


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-THORSTENPHPMYFAQ-14535950
  • published19 Dec 2025
  • disclosed17 Dec 2025
  • creditMirabbas Ağalarov

Introduced: 17 Dec 2025

CVE-2023-53929  (opens in a new tab)
CWE-1236  (opens in a new tab)

How to fix?

Upgrade thorsten/phpmyfaq to version 3.1.16 or higher.

Overview

thorsten/phpmyfaq is a FAQ system for PHP and MySQL, PostgreSQL and other databases

Affected versions of this package are vulnerable to CSV Injection via the users data export feature. An attacker can execute arbitrary commands on the system by injecting malicious formulas into the profile name field, which are then executed when an administrator exports user data as a CSV file.

CVSS Base Scores

version 4.0
version 3.1