Description
phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenated with the base upload directory path without any path traversal validation. The FILTER_SANITIZE_SPECIAL_CHARS filter only encodes HTML special characters (&, ', ", <, >) and characters with ASCII value < 32, and does not prevent directory traversal sequences like ../. Additionally, the endpoint does not validate CSRF tokens, making it exploitable via CSRF attacks. This issue has been patched in version 4.1.1.
INFO
Published Date :
2026-04-02T14:44:19.135Z
Last Modified :
2026-04-02T15:24:02.916Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-34728 vulnerability.
| Vendors | Products |
|---|---|
| Thorsten |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-34728.