{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:12:25.554","vulnerabilities":[{"cve":{"id":"CVE-2024-56199","sourceIdentifier":"security-advisories@github.com","published":"2025-01-02T18:15:20.427","lastModified":"2025-08-14T17:54:26.950","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"phpMyFAQ is an open source FAQ web application. Starting no later than version 3.2.10 and prior to version 4.0.2, an attacker can inject malicious HTML content into the FAQ editor at `http[:]//localhost/admin/index[.]php?action=editentry`, resulting in a complete disruption of the FAQ page's user interface. By injecting malformed HTML elements styled to cover the entire screen, an attacker can render the page unusable. This injection manipulates the page structure by introducing overlapping buttons, images, and iframes, breaking the intended layout and functionality. Exploiting this issue can lead to Denial of Service for legitimate users, damage to the user experience, and potential abuse in phishing or defacement attacks. Version 4.0.2 contains a patch for the vulnerability."},{"lang":"es","value":"phpMyFAQ es una aplicación web de código abierto para preguntas frecuentes. A partir de la versión 3.2.10 y antes de la versión 4.0.2, un atacante puede inyectar contenido HTML malicioso en el editor de preguntas frecuentes en `http[:]//localhost/admin/index[.]php?action=editentry`, lo que provoca una interrupción total de la interfaz de usuario de la página de preguntas frecuentes. Al inyectar elementos HTML mal formados con un estilo que cubra toda la pantalla, un atacante puede dejar la página inutilizable. Esta inyección manipula la estructura de la página mediante la introducción de botones, imágenes e iframes superpuestos, lo que rompe el diseño y la funcionalidad previstos. La explotación de este problema puede provocar una denegación de servicio para usuarios legítimos, daños a la experiencia del usuario y un posible abuso en ataques de phishing o desfiguración. La versión 4.0.2 contiene un parche para la vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:L","baseScore":5.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":0.9,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:H","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":4.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-80"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2.10","versionEndExcluding":"4.0.2","matchCriteriaId":"7DCB12FE-8E0E-41DC-9F71-7ABAC5258521"}]}]}],"references":[{"url":"https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-ww33-jppq-qfrp","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}