phpMyFAQ 3.1.12 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into their profile names. Attackers can modify their user profile name with a payload like 'calc|a!z|' to trigger code execution when an administrator exports user data as a CSV file.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51399 | Exploit Third Party Advisory |
| https://www.phpmyfaq.de/ | Product |
| https://www.vulncheck.com/advisories/phpmyfaq-csv-injection-via-user-profile-export | Third Party Advisory |
| https://www.exploit-db.com/exploits/51399 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-17 23:15
Updated : 2025-12-31 18:45
NVD link : CVE-2023-53929
Mitre link : CVE-2023-53929
CVE.ORG link : CVE-2023-53929
JSON object : View
Products Affected
phpmyfaq
- phpmyfaq
CWE
CWE-1236
Improper Neutralization of Formula Elements in a CSV File
