GHSA-FV26-4939-62FH
Vulnerability from github – Published: 2026-05-04 21:20 – Updated: 2026-05-13 13:42
VLAI?
Summary
phpVMS has an /importer authorization bypass causing full database wipe
Details
Security Advisory: Unauthenticated Access to Legacy Import Feature
Severity: Critical Affected versions: phpVMS 7.x (up to 7.0.5) Fixed in: v7.0.6 Component: Legacy importer
Summary
A critical vulnerability in phpVMS 7.x allowed unauthenticated access to a legacy import feature. Although this feature is deprecated, parts of it remained accessible and operational.
Impact
A remote attacker could trigger internal processes that modify or delete application data, potentially resulting in:
- Data loss
- Service disruption
No authentication was required.
Remediation
- Update immediately to the latest patched version
- If unable to update:
- The release link has instructions on how to fix it (it's a one-line fix to comment out the routes)
Affected Versions
- Affected: phpVMS 7.x ≤ 7.0.5
- Not affected: phpVMS >= 7.0.6, v8 (feature removed from public access)
Severity ?
9.4 (Critical)
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "nabeel/phpvms"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.0.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-42569"
],
"database_specific": {
"cwe_ids": [
"CWE-284",
"CWE-306",
"CWE-862"
],
"github_reviewed": true,
"github_reviewed_at": "2026-05-04T21:20:40Z",
"nvd_published_at": "2026-05-09T20:16:29Z",
"severity": "CRITICAL"
},
"details": "# Security Advisory: Unauthenticated Access to Legacy Import Feature\n\n**Severity:** Critical\n**Affected versions:** phpVMS 7.x (up to 7.0.5)\n**Fixed in:** v7.0.6\n**Component:** Legacy importer\n\n## Summary\n\nA critical vulnerability in phpVMS 7.x allowed unauthenticated access to a legacy import feature. Although this feature is deprecated, parts of it remained accessible and operational.\n\n## Impact\n\nA remote attacker could trigger internal processes that modify or delete application data, potentially resulting in:\n\n- Data loss\n- Service disruption\n\nNo authentication was required.\n\n## Remediation\n\n- **Update immediately** to [the latest patched version](https://github.com/phpvms/phpvms/releases/tag/7.0.7)\n- If unable to update:\n - The release link has instructions on how to fix it (it\u0027s a one-line fix to comment out the routes)\n\n## Affected Versions\n\n* Affected: phpVMS 7.x \u2264 7.0.5\n* Not affected: phpVMS \u003e= 7.0.6, v8 (feature removed from public access)",
"id": "GHSA-fv26-4939-62fh",
"modified": "2026-05-13T13:42:25Z",
"published": "2026-05-04T21:20:40Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/phpvms/phpvms/security/advisories/GHSA-fv26-4939-62fh"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42569"
},
{
"type": "WEB",
"url": "https://github.com/phpvms/phpvms/commit/f59ba8e0e8fc25c60c3faf14e526cfd49df3f7dc"
},
{
"type": "PACKAGE",
"url": "https://github.com/phpvms/phpvms"
},
{
"type": "WEB",
"url": "https://github.com/phpvms/phpvms/releases/tag/7.0.6"
},
{
"type": "WEB",
"url": "https://github.com/phpvms/phpvms/releases/tag/7.0.7"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "phpVMS has an /importer authorization bypass causing full database wipe"
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…