phpMyFAQ v3.1.12 CSV Injection

CVE Category Price Severity
CVE-2020-25177 CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2023-05-08

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

phpMyFAQ v3.1.12 CSV Injection
Exploit Title: phpMyFAQ v3.1.12 - CSV Injection
Application: phpMyFAQ
Version: 3.1.12
Bugs:  CSV Injection
Technology: PHP
Vendor URL:
Software Link:
Date of found: 21.04.2023
Author: Mirabbas Aalarov
Tested on: Windows

2. Technical Details & POC
Step 1. login as user
step 2. Go to user control panel and change name as =calc|a!z| and save
step 3. If admin Export users as CSV ,in The computer of admin  occurs csv injection and will open calculator

payload: calc|a!z|
Poc video:

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.