-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| cakephp/cakephp | composer | >= 1.2.8, < 1.3.6 | 1.3.6 |
The vulnerability stems from the _validatePost function's insecure deserialization of user-controlled input. The original code used unserialize(str_rot13($locked)) without validating the payload's structure, enabling attackers to inject malicious objects. The patch added a regex check to block object deserialization, confirming this was the attack vector. The App class's __destruct method (used in cache manipulation) is exploited via this deserialization, but the root cause is the insecure unserialize call in _validatePost.
A Semantic Attack on Google Gemini - Read the Latest Research