-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from unauthenticated processing of the 'q' parameter in index.php. The exploit pattern (index.php?q=file:///) indicates direct use of the parameter in a file retrieval function. PHP's file_get_contents() is the most likely candidate as it natively supports file:// protocol handling. The lack of authentication checks (CWE-287) and protocol allow-listing in the parameter processing makes this function the root cause.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| athlon1600/php-proxy-app | composer | <= 3.0 |