CVE-2026-45010

Received
Published: 15 May 2026, 18:36
Last modified:15 May 2026, 22:22

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
9.1 CRITICAL
v3.1 (cve.org)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

15 May 2026, 18:36
Published
Vulnerability first disclosed
15 May 2026, 22:22
Last Modified
Vulnerability information updated

Description

phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers can brute-force any user's six-digit TOTP code by submitting POST requests with sequential token values, bypassing two-factor authentication to gain full administrative access.

CVSS Metrics

  • v3.1CRITICALScore: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Techniques & Countermeasures

  • CWE-307Improper Restriction of Excessive Authentication Attempts

    The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.

Affected Systems

  • thorstenphpmyfaq

    < 4.1.2

References (2)