CVE-2026-46364: Critical SQL Injection in phpMyFAQ Unauthenticated API Access
The National Vulnerability Database has identified a critical unauthenticated SQL injection vulnerability (CVE-2026-46364) impacting phpMyFAQ versions prior to 4.1.2. Attackers can exploit the public /api/captcha endpoint by manipulating the User-Agent header. This allows for time-based blind SQL injection, potentially leading to the exfiltration of sensitive data, including user credentials, admin tokens, and SMTP configurations stored in the database.
This vulnerability stems from the interpolation of unsanitized User-Agent strings directly into DELETE and INSERT SQL queries within the BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods. The CVSS score of 9.8 highlights the severity, indicating a high potential for impact on confidentiality, integrity, and availability.
Defenders must prioritize patching phpMyFAQ installations to version 4.1.2 or later immediately. Given the unauthenticated nature of the exploit, any exposed instance is a prime target. Auditing database access logs for suspicious queries and reviewing the integrity of stored credentials should be part of the immediate response.
What This Means For You
- If your organization uses phpMyFAQ, you must patch to version 4.1.2 or higher immediately. This vulnerability allows unauthenticated attackers to access sensitive database information, including user credentials, by simply sending a crafted HTTP request. Review your web server access logs for any unusual activity targeting the `/api/captcha` endpoint.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-46364: Unauthenticated SQL Injection via phpMyFAQ API Captcha Endpoint
title: CVE-2026-46364: Unauthenticated SQL Injection via phpMyFAQ API Captcha Endpoint
id: scw-2026-05-15-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-46364 by targeting the /api/captcha endpoint of phpMyFAQ with common SQL injection keywords in the URI. This vulnerability allows unauthenticated attackers to perform time-based blind SQL injection by manipulating the User-Agent header, leading to sensitive data exfiltration.
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-46364/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/captcha'
cs-method|exact:
- 'GET'
uri|contains:
- 'UNION'
- 'SLEEP'
- 'BENCHMARK'
- 'AND'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-46364 | SQLi | phpMyFAQ versions prior to 4.1.2 |
| CVE-2026-46364 | SQLi | Vulnerable methods: BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() |
| CVE-2026-46364 | SQLi | Vulnerable endpoint: GET /api/captcha |
| CVE-2026-46364 | SQLi | Attack vector: Malicious User-Agent headers |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 15, 2026 at 22:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.