CVE-2026-34729 — phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there…
Image via opengraph.githubassets.com
🚨 CVE-2026-34729 phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there is a stored XSS vulnerability via Regex Bypass in Filter::removeAttributes(). This issue has been patched in version 4.1.1.
Release 4.1.1 · thorsten/phpMyFAQ
github.com
What This Means For You
- New vulnerability disclosed — verify if your stack is exposed.
- New tool or resource available — evaluate for your security workflow.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-34729 | XSS | phpMyFAQ version prior to 4.1.1, Stored XSS via Regex Bypass in Filter::removeAttributes() |
🛠 Recommended Tools
Source & Attribution
| Source Platform | Telegram |
| Channel | CVE Notify |
| Channel ID | 1129491012 |
| Message ID | 158287 |
| Published | April 07, 2026 at 17:56 UTC |
| Original Link | https://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1 |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.
Found this interesting? Follow us to stay ahead.
Share