Replay Attack Affecting thorsten/phpmyfaq package, versions <3.1.12
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.21% (60th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-THORSTENPHPMYFAQ-5414884
- published 6 Apr 2023
- disclosed 6 Apr 2023
- credit ahmedvienna
Introduced: 6 Apr 2023
CVE-2023-1886 Open this link in a new tabHow to fix?
Upgrade thorsten/phpmyfaq
to version 3.1.12 or higher.
Overview
thorsten/phpmyfaq is a FAQ system for PHP and MySQL, PostgreSQL and other databases
Affected versions of this package are vulnerable to Replay Attack due to insufficient checks for the captcha verification.
References
CVSS Scores
version 3.1