CVE-2025-63950
BaseFortify
Publication date: 2025-12-18
Last updated on: 2025-12-19
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| to3k | twittodon | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an insecure deserialization issue in the download.php script of the to3k Twittodon application. The 'obj' parameter accepts base64-encoded data that is directly passed to the PHP unserialize() function without any validation. This allows a remote, unauthenticated attacker to inject arbitrary PHP objects, potentially causing a denial of service. [2]
How can this vulnerability impact me? :
The vulnerability can allow a remote attacker to inject arbitrary PHP objects into the application, which can lead to a denial of service. This means the application could crash or become unavailable, disrupting service for users. [2]