An insecure deserialization vulnerability exists in the download.php script of the to3k Twittodon application through commit b1c58a7d1dc664b38deb486ca290779621342c0b (2023-02-28). The 'obj' parameter receives base64-encoded data that is passed directly to the unserialize() function without validation. This allows a remote, unauthenticated attacker to inject arbitrary PHP objects, leading to a denial of service.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insecure deserialization vulnerability exists in the download.php script of the to3k Twittodon application through commit b1c58a7d1dc664b38deb486ca290779621342c0b (2023-02-28). The 'obj' parameter receives base64-encoded data that is passed directly to the unserialize() function without validation. This allows a remote, unauthenticated attacker to inject arbitrary PHP objects, leading to a denial of service. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-18T21:20:56.473Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63950
Updated: 2025-12-18T21:20:53.747Z
Status : Received
Published: 2025-12-18T21:15:54.970
Modified: 2025-12-18T22:15:59.950
Link: CVE-2025-63950
No data.
OpenCVE Enrichment
No data.