Description

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenated with the base upload directory path without any path traversal validation. The FILTER_SANITIZE_SPECIAL_CHARS filter only encodes HTML special characters (&, ', ", <, >) and characters with ASCII value < 32, and does not prevent directory traversal sequences like ../. Additionally, the endpoint does not validate CSRF tokens, making it exploitable via CSRF attacks. This issue has been patched in version 4.1.1.

INFO

Published Date :

2026-04-02T14:44:19.135Z

Last Modified :

2026-04-02T15:24:02.916Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-34728 vulnerability.

Vendors Products
Thorsten
  • Phpmyfaq
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-34728.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact