CVE-2022-31140: Valinor error messages leading to potential data exfiltration before v0.12.0
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33459%
CWE
Published
7/12/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
cuyz/valinor | composer | < 0.12.0 | 0.12.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises because Valinor's error handling system included exception messages from userland code (e.g., Money::fromString
) in error outputs by default. The Message::body()
method directly exposes these messages via Throwable::getMessage()
, which could contain sensitive data. The fix in 0.12.0 introduced explicit filtering via MapperBuilder::filterExceptions()
, confirming that the root cause was unvalidated exposure of exception messages through this method.