-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| flarum/core | composer | < 1.7.0 | 1.7.0 |
The vulnerability stemmed from unvalidated processing of custom LESS input. The patch added a preg_match check in ValidateCustomLess.php to block @import and data-uri patterns. The whenSettingsSaving method was responsible for processing this input but lacked these security checks in vulnerable versions, making it the entry point for malicious LESS code execution. The commit diff clearly shows this security validation was missing prior to v1.7.0.
A Semantic Attack on Google Gemini - Read the Latest Research