CVE-2021-29476: Insecure Deserialization of untrusted data in rmccue/requests
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.83781%
CWE
Published
4/29/2021
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rmccue/requests | composer | >= 1.6.0, < 1.8.0 | 1.8.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure deserialization in the Requests_Utility_FilteredIterator class. The commit add6bedf3a53b647d0ebda2970057912d3cd79d3 in WordPress core explicitly patched this by adding empty __unserialize() and unserialize() methods, and unsetting the 'callback' property in __wakeup(). The original vulnerability allowed attackers to inject serialized objects with malicious callbacks, which would be executed via the current() method during iteration. The CVE references and PHPGGC discussion (issue #52) confirm this class was a key vector for exploitation via phar:// deserialization.