CVE-2026-32629
Severity CVSS v4.0:
MEDIUM
Type:
CWE-20
Input Validation
Publication date:
02/04/2026
Last modified:
07/04/2026
Description
phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, an unauthenticated attacker can submit a guest FAQ with an email address that is syntactically valid per RFC 5321 (quoted local part) yet contains raw HTML — for example "alert(1)"@evil.com. PHP's FILTER_VALIDATE_EMAIL accepts this email as valid. The email is stored in the database without HTML sanitization and later rendered in the admin FAQ editor template using Twig's |raw filter, which bypasses auto-escaping entirely. This issue has been patched in version 4.1.1.
Impact
Base Score 4.0
5.40
Severity 4.0
MEDIUM
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:* | 4.1.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



