Miggo Logo

GHSA-c42h-56wx-h85q:
laravel-auth0 SDK Deserialization of Untrusted Data vulnerability

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
6/6/2025
Updated
6/6/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
auth0/logincomposer>= 7.0.0-BETA1, <= 7.2.17.2.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in the auth0/auth0-php SDK, specifically within the CookieStore class, which is a dependency of auth0/laravel-auth0. The advisory GHSA-c42h-56wx-h85q for laravel-auth0 points to GHSA-v9m8-9xxp-q492 for auth0-php as the root cause.

The patch for auth0-php (commit 04b1f5daa8bdfebc5e740ec5ca0fb2df1648a715 in auth0/auth0-php, corresponding to version 8.3.1) shows modifications in src/Store/CookieStore.php. The core of the vulnerability is the use of unserialize() on cookie data within the decrypt() method. An attacker could provide a specially crafted cookie containing a serialized PHP object, which, when processed by unserialize(), could lead to arbitrary code execution or other malicious outcomes.

The fix involves replacing the unserialize() call with json_decode(..., true) in the decrypt() method. Correspondingly, the encrypt() method was also updated to use json_encode() instead of serialize() to ensure data compatibility and security.

Therefore, the primary vulnerable function that would appear in a runtime profile during exploitation is Auth0\SDK\Store\CookieStore::decrypt from the auth0/auth0-php package, as it directly handles the deserialization of the potentially malicious cookie data. While laravel-auth0 is the affected package reported by the user, the actual vulnerable code resides in its dependency, auth0-php.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**Ov*rvi*w** T** l*r*v*l-*ut** S*K *ont*ins * *riti**l vuln*r**ility *u* to ins**ur* **s*ri*liz*tion o* *ooki* **t*. I* *xploit**, sin** S*Ks pro**ss *ooki* *ont*nt wit*out prior *ut**nti**tion, * t*r**t **tor *oul* s*n* * sp**i*lly *r**t** *ooki* *o

Reasoning

T** vuln*r**ility li*s in t** `*ut**/*ut**-p*p` S*K, sp**i*i**lly wit*in t** `*ooki*Stor*` *l*ss, w*i** is * **p*n**n*y o* `*ut**/l*r*v*l-*ut**`. T** **visory **S*-****-**wx-***q *or `l*r*v*l-*ut**` points to **S*-v*m*-*xxp-q*** *or `*ut**-p*p` *s t*