Moderate severityOSV Advisory· Published Dec 17, 2025· Updated Apr 7, 2026
phpMyFAQ 3.1.12 CSV Injection via User Profile Export
CVE-2023-53929
Description
phpMyFAQ 3.1.12 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into their profile names. Attackers can modify their user profile name with a payload like 'calc|a!z|' to trigger code execution when an administrator exports user data as a CSV file.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
thorsten/phpmyfaqPackagist | <= 3.1.12 | — |
phpmyfaq/phpmyfaqPackagist | <= 3.1.12 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.exploit-db.com/exploits/51399ghsaexploitWEB
- github.com/advisories/GHSA-x2v3-9p22-w3x6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-53929ghsaADVISORY
- www.vulncheck.com/advisories/phpmyfaq-csv-injection-via-user-profile-exportghsathird-party-advisoryWEB
- www.phpmyfaq.deghsaWEB
- www.phpmyfaq.demitreproduct
News mentions
0No linked articles in our index yet.