PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-46362 thorsten CVE debrief

CVE-2026-46362 is a medium-severity authorization bypass affecting phpMyFAQ before 4.1.2. The issue is described as a failure in AbstractAdministrationController::userHasPermission() to stop execution after sending a forbidden response, which can let authenticated users reach permission-protected admin pages. The exposed data can include admin logs, user records, system information, and application configuration. The CVE was published on 2026-05-15 and later modified on 2026-05-18.

Vendor
thorsten
Product
phpmyfaq
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-15
Original CVE updated
2026-05-18
Advisory published
2026-05-15
Advisory updated
2026-05-18

Who should care

Organizations running phpMyFAQ, especially teams that expose its admin interface to authenticated users, should treat this as a priority patching issue. Security and operations teams responsible for access control, admin portal hardening, and data exposure review should care most.

Technical summary

The supplied record describes an authorization control failure in phpMyFAQ's admin controller logic. AbstractAdministrationController::userHasPermission() is said to send a forbidden response but continue execution instead of terminating, allowing authenticated attackers to request permission-protected admin URLs and bypass intended access checks. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, and the associated weakness is CWE-863.

Defensive priority

High for any phpMyFAQ deployment still below 4.1.2, because the flaw can expose sensitive administrative information to authenticated users without requiring user interaction. Patch quickly and review exposed admin data paths.

Recommended defensive actions

  • Upgrade phpMyFAQ to version 4.1.2 or later.
  • Restrict access to administrative interfaces to the smallest possible set of authenticated users.
  • Review admin logs, user data, system information, and configuration exposure for unintended access.
  • Check any local patches or customizations to ensure forbidden responses terminate execution immediately.
  • Monitor authentication and admin-access logs for unusual requests to permission-protected URLs.

Evidence notes

The supplied source corpus identifies phpMyFAQ before 4.1.2 as affected and describes the flaw as a non-terminating permission check in AbstractAdministrationController::userHasPermission(). The record also cites a GitHub Security Advisory and a VulnCheck advisory as references. NVD metadata in the supplied item marks the record as Deferred and lists CWE-863 with the provided CVSS vector.

Official resources

Publicly disclosed in the supplied record on 2026-05-15, with a source-modified update on 2026-05-18. The record cites both a GitHub Security Advisory and a VulnCheck advisory. NVD metadata in the supplied source currently shows the CVE as