An insecure deserialization vulnerability exists in the download.php script of the to3k Twittodon application through commit b1c58a7d1dc664b38deb486ca290779621342c0b (2023-02-28). The 'obj' parameter receives base64-encoded data that is passed directly to the unserialize() function without validation. This allows a remote, unauthenticated attacker to inject arbitrary PHP objects, leading to a denial of service.
Metrics
Affected Vendors & Products
References
History
Wed, 31 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tomaszdunia
Tomaszdunia twittodon |
|
| CPEs | cpe:2.3:a:tomaszdunia:twittodon:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tomaszdunia
Tomaszdunia twittodon |
Thu, 18 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insecure deserialization vulnerability exists in the download.php script of the to3k Twittodon application through commit b1c58a7d1dc664b38deb486ca290779621342c0b (2023-02-28). The 'obj' parameter receives base64-encoded data that is passed directly to the unserialize() function without validation. This allows a remote, unauthenticated attacker to inject arbitrary PHP objects, leading to a denial of service. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-18T21:20:56.473Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63950
Updated: 2025-12-18T21:20:53.747Z
Status : Analyzed
Published: 2025-12-18T21:15:54.970
Modified: 2025-12-31T19:32:50.907
Link: CVE-2025-63950
No data.