We found results for “”
CVE-2025-69200
Good to know:
Date: December 29, 2025
phpMyFAQ is an open source FAQ web application. In versions prior to 4.0.16, an unauthenticated remote attacker can trigger generation of a configuration backup ZIP via "POST /api/setup/backup" and then download the generated ZIP from a web-accessible location. The ZIP contains sensitive configuration files (e.g., "database.php" with database credentials), leading to high-impact information disclosure and potential follow-on compromise. Version 4.0.16 fixes the issue.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Exposure of Sensitive Information Through Data Queries
CWE-202Top Fix
Upgrade Version
Upgrade to version phpmyfaq/phpmyfaq - 4.0.16;https://github.com/thorsten/phpMyFAQ.git - 4.0.16
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


