CVE-2025-59943

Analyzed
Published: 03 Oct 2025, 20:06
Last modified:03 Oct 2025, 20:45

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
9.8 CRITICAL
v3.1 (nvd)
EPSS Score
0.05% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
1 found
Dark Web
Not detected

Timeline

03 Oct 2025, 20:06
Published
Vulnerability first disclosed
03 Oct 2025, 20:45
Last Modified
Vulnerability information updated

Description

phpMyFAQ is an open source FAQ web application. Versions 4.0-nightly-2025-10-03 and below do not enforce uniqueness of email addresses during user registration. This allows multiple distinct accounts to be created with the same email. Because email is often used as an identifier for password resets, notifications, and administrative actions, this flaw can cause account ambiguity and, in certain configurations, may lead to privilege escalation or account takeover. This issue is fixed in version 4.0.13.

CVSS Metrics

  • v3.1HIGHScore: 8.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
  • v3.1CRITICALScore: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Trends

Current EPSS score: 0.05% Percentile: 16%

Techniques & Countermeasures

  • CWE-284Improper Access Control

    The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

  • CWE-286Incorrect User Management

    The product does not properly manage a user within its environment.

Affected Systems

  • phpmyfaqphpmyfaq

    4.0.7

  • thorstenphpmyfaq

    ≥ 4.0.7, < 4.0.13

References (2)