CVE-2023-43655:
Composer Remote Code Execution vulnerability via web-accessible composer.phar
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.83331%
CWE
Published
9/29/2023
Updated
2/13/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
composer/composer | composer | < 1.10.27 | 1.10.27 |
composer/composer | composer | >= 2.0.0, < 2.2.22 | 2.2.22 |
composer/composer | composer | >= 2.3.0, < 2.6.4 | 2.6.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Composer's entry point script (bin/composer) being executable as a PHP file in web-accessible environments with register_argc_argv enabled. The core issue is not a specific function but rather the lack of environment validation in the main script flow. The patch adds a check at the script level (not within a specific function) to abort execution when running under non-CLI SAPIs with register_argc_argv enabled. No specific functions are mentioned in the advisory or commit diffs as being vulnerable - the risk arises from the interaction between PHP's argv handling and Composer's entry point execution context.