phpMyFAQ 3.1.12 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into their profile names. Attackers can modify their user profile name with a payload like 'calc|a!z|' to trigger code execution when an administrator exports user data as a CSV file.
History

Wed, 17 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description phpMyFAQ 3.1.12 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into their profile names. Attackers can modify their user profile name with a payload like 'calc|a!z|' to trigger code execution when an administrator exports user data as a CSV file.
Title phpMyFAQ 3.1.12 CSV Injection via User Profile Export
Weaknesses CWE-1236
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 6.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-17T22:44:57.447Z

Reserved: 2025-12-16T19:22:09.996Z

Link: CVE-2023-53929

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-17T23:15:52.343

Modified: 2025-12-17T23:15:52.343

Link: CVE-2023-53929

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.