-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the intervention/image package interpreting file streams as URLs. The pre-patch code passed $file->getStream() to imageManager->make(), which reads raw content. If the uploaded file contained a URL string (with spoofed MIME), the library would fetch it, enabling SSRF/LFI. The patch replaced getStream() with getStream()->getMetadata('uri'), forcing the library to treat the input as a local file path instead of raw content, mitigating URL interpretation. The modified functions in the commit diff directly correlate to avatar/file upload handlers, making them the entry points for exploitation.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| flarum/core | composer | < 1.8.0 | 1.8.0 |
| flarum/framework | composer | < 1.8.0 | 1.8.0 |
Ongoing coverage of React2Shell