-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the File::fromData method's handling of user-supplied filenames. The original code used the user-provided filename directly to create a temporary file path (via temp_path(basename($filename))), allowing attackers to predict the temporary file's location. This predictability enabled a race condition where an attacker could write a malicious payload to the temporary file and execute it before the system deleted it. The patch introduced a randomized temporary filename (via uniqid()), breaking the predictability. The commit diff confirms this critical change occurred in the fromData method's logic.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| october/system | composer | < 1.0.476 | 1.0.476 |
| october/system | composer | >= 1.1.0, < 1.1.12 | 1.1.12 |
| october/system | composer | >= 2.0.0, < 2.2.15 | 2.2.15 |
Ongoing coverage of React2Shell