๐Ÿ” CVE Alert

CVE-2026-34973

UNKNOWN 0.0

phpMyFAQ has a LIKE Wildcard Injection in Search.php โ€” Unescaped % and _ Metacharacters Enable Broad Content Disclosure

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
26th

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the searchCustomPages() method in phpmyfaq/src/phpMyFAQ/Search.php uses real_escape_string() (via escape()) to sanitize the search term before embedding it in LIKE clauses. However, real_escape_string() does not escape SQL LIKE metacharacters % (match any sequence) and _ (match any single character). An unauthenticated attacker can inject these wildcards into search queries, causing them to match unintended records โ€” including content that was not meant to be surfaced โ€” resulting in information disclosure. This issue has been patched in version 4.1.1.

CWE CWE-943
Vendor thorsten
Product phpmyfaq
Published Apr 2, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for thorsten phpmyfaq

Be the first to know when new unknown vulnerabilities affecting thorsten phpmyfaq are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

thorsten / phpMyFAQ
< 4.1.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-gcp9-5jc8-976x github.com: https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1