CVE-2026-34729 — phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there…

CVE-2026-34729 — phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there…

Image via opengraph.githubassets.com

🚨 CVE-2026-34729 phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there is a stored XSS vulnerability via Regex Bypass in Filter::removeAttributes(). This issue has been patched in version 4.1.1.

What This Means For You

  • New vulnerability disclosed — verify if your stack is exposed.
  • New tool or resource available — evaluate for your security workflow.

Related ATT&CK Techniques

Indicators of Compromise

IDTypeIndicator
CVE-2026-34729 XSS phpMyFAQ version prior to 4.1.1, Stored XSS via Regex Bypass in Filter::removeAttributes()
Source & Attribution
Source PlatformTelegram
ChannelCVE Notify
Channel ID1129491012
Message ID158287
PublishedApril 07, 2026 at 17:56 UTC
Original Linkhttps://github.com/thorsten/phpMyFAQ/releases/tag/4.1.1

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Found this interesting? Follow us to stay ahead.

Telegram Channel Follow Shimi Cohen Follow Shimi's Cyber World
Share
LinkedIn WhatsApp Reddit