icon

We found results for “

CVE-2025-2376

Good to know:

icon

Date: March 17, 2025

A vulnerability has been found in viames Pair Framework up to 1.9.11 and classified as critical. Affected by this vulnerability is the function getCookieContent of the file /src/UserRemember.php of the component PHP Object Handler. The manipulation of the argument cookieName leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Severity Score

Severity Score

Weakness Type (CWE)

Deserialization of Untrusted Data

CWE-502

Improper Input Validation

CWE-20

Top Fix

icon

Upgrade Version

Upgrade to version viames/pair - 1.8.4;viames/pair - dev-pair;viames/pair - dev-main;viames/pair - 1.8.51;viames/pair - 1.1.0;viames/pair - no_fix;viames/pair - 1.8;viames/pair - 1.8.8;viames/pair - 2.0.0-alpha;viames/pair - 1.8.13;viames/pair - 1.8.10;nexev-it/pair - 1.0.0;nexev-it/pair - no_fix

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): LOW

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us