HomeIntelligenceBrief
VULNERABILITY BRIEF🟡 Medium Vulnerability

Improper Authorization in phpMyFAQ 4.0.16 (CVE‑2026‑24421) Lets Non‑Admin Users Export Sensitive Backups

A missing permission check in phpMyFAQ ≤ 4.0.16 enables any authenticated, non‑admin user to trigger a configuration backup via the /api/setup/backup endpoint and obtain a downloadable ZIP file. The backup may contain database credentials, API keys, and internal settings, posing a third‑party risk for organizations that host or embed the FAQ platform.

LiveThreat™ Intelligence · 📅 April 29, 2026· 📰 exploit-db.com
🟡
Severity
Medium
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
exploit-db.com

Improper Authorization in phpMyFAQ 4.0.16 (CVE‑2026‑24421) Allows Non‑Admin Users to Export Configuration Backups

What Happened – A missing authorization check in SetupController.php of phpMyFAQ ≤ 4.0.16 lets any authenticated, non‑admin user invoke the /api/setup/backup endpoint and receive a path to a ZIP file containing a full configuration backup.

Why It Matters for TPRM

  • Unauthorized backup files may contain database credentials, API keys, and internal network topology.
  • Exposure of these artifacts can enable lateral movement against downstream vendors or cloud services.
  • The flaw is exploitable with a valid user account, making it a realistic threat for organizations that host phpMyFAQ as a SaaS or on‑premise knowledge‑base solution.

Who Is Affected

  • Organizations running phpMyFAQ ≤ 4.0.16 (education portals, intranets, public‑facing FAQ sites).
  • Vendors that embed phpMyFAQ as a component of larger SaaS offerings.

Recommended Actions

  • Verify phpMyFAQ version; upgrade to 4.0.17 or later where the authorization check is fixed.
  • If immediate upgrade is not possible, restrict API access to trusted IP ranges and enforce least‑privilege roles.
  • Review web server configuration to ensure generated backup ZIP files are not publicly reachable.
  • Conduct a credential audit for any secrets stored in the phpMyFAQ configuration.

Technical Notes – The vulnerability (CVE‑2026‑24421) is an Improper Authorization flaw. The endpoint authenticates the request (userIsAuthenticated()) but fails to verify admin or configuration permissions, allowing a privilege‑escalation via API. Exploitation requires a valid, non‑admin credential; no CVSS score is published yet, but the impact is considered moderate due to potential secret leakage. Source: Exploit‑DB 52523

📰 Original Source
https://www.exploit-db.com/exploits/52523

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.