PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-46361 thorsten CVE debrief

CVE-2026-46361 is a stored cross-site scripting vulnerability in phpMyFAQ before 4.1.2. The issue is described as unsafe rendering in search.twig, where result.question and result.answerPreview are output with the raw filter, bypassing Twig autoescape protections. An attacker with FAQ editor privileges can store HTML-entity-encoded payloads that survive the SearchController.php processing path and execute JavaScript in visitors’ browsers, including administrators.

Vendor
thorsten
Product
phpmyfaq
CVSS
MEDIUM 6.9
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-15
Original CVE updated
2026-05-18
Advisory published
2026-05-15
Advisory updated
2026-05-18

Who should care

Administrators of phpMyFAQ deployments, especially environments that allow FAQ editor privileges, moderate user-submitted content, or expose search results to authenticated staff and administrators.

Technical summary

The supplied CVE description says phpMyFAQ before 4.1.2 renders search results in search.twig using the raw filter for result.question and result.answerPreview. That disables autoescape and creates a stored XSS condition. The content path described by the record indicates html_entity_decode(strip_tags()) in SearchController.php does not prevent HTML-entity-encoded payloads from reaching the template, allowing script execution when users view affected search results.

Defensive priority

Medium. The CVSS base score is 6.9, but the impact can be broad because the payload is stored and executes in visitor and administrator browser contexts. Prioritize remediation if FAQ editor access is available to multiple users or if the search result page is heavily used.

Recommended defensive actions

  • Upgrade phpMyFAQ to 4.1.2 or later as soon as practical.
  • Review search.twig and remove or minimize raw rendering for result.question and result.answerPreview unless output is explicitly sanitized and intended to be trusted.
  • Audit FAQ editor accounts and limit who can create or modify FAQ content.
  • Search existing FAQ entries and related stored content for suspicious HTML-entity-encoded payloads and remove malicious records.
  • Validate that server-side processing and template output use a consistent allowlist/escaping approach for user-controlled fields.

Evidence notes

This debrief is based on the supplied CVE description, the NVD record, and the linked GitHub Security Advisory/Vulncheck advisory references. The record is classified as CWE-79 (stored XSS) and the NVD source item lists vulnStatus as Deferred, so the detailed behavior is taken from the advisory-linked description rather than additional enrichment.

Official resources

Publicly disclosed in the CVE record on 2026-05-15 and modified on 2026-05-18. The supplied corpus links the disclosure to a GitHub Security Advisory and a Vulncheck advisory, while NVD marks the record as Deferred.