CVE-2022-1176: Type Confusion in LiveHelperChat
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50585%
CWE
Published
4/1/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
remdex/livehelperchat | composer | < 3.96 | 3.96 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from loose comparisons (==) between chat hashes and user input across multiple REST API endpoints. PHP
's type juggling allows values like '0e1234' (string) and 0 (integer) to be considered equal via ==, enabling hash bypass. The commit explicitly replaces == with === in these checks, confirming these conditional blocks as the vulnerable points. Each listed file
contains a critical access control check that was exploitable via type confusion.