CVE-2026-37552
Unsafe Deserialization in MixPHP Framework
Publication date: 2026-05-01
Last updated on: 2026-05-01
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mixphp | framework | From 2.0.0 (inc) to 2.2.17 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the sync-invoke TCP server in MixPHP Framework versions up to 2.2.17 listening on localhost (127.0.0.1). Detection can focus on monitoring TCP connections to the localhost port used by the Server.php component.
You can detect suspicious activity by checking for unexpected TCP connections or data sent to the localhost port that the sync-invoke server listens on. Since the server deserializes and executes PHP closures received over this port without authentication, any unusual or unauthorized connections or serialized payloads could indicate exploitation attempts.
Suggested commands to detect this vulnerability include:
- Use netstat or ss to monitor TCP connections on localhost: `netstat -anp | grep 127.0.0.1` or `ss -anp | grep 127.0.0.1`
- Use tcpdump or Wireshark to capture and analyze traffic on the localhost interface for suspicious serialized PHP closures: `tcpdump -i lo tcp port <port_number>`
- Check application logs or enable logging in the Server.php component to detect deserialization and execution events.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the localhost TCP port used by the sync-invoke server to trusted users only, since the vulnerability requires access to this port.
Additionally, consider upgrading the MixPHP Framework to a version that patches this unsafe deserialization vulnerability if available.
If upgrading is not immediately possible, disable or restrict the sync-invoke TCP server component to prevent it from accepting serialized closures from untrusted sources.
Implement network-level controls or firewall rules to block unauthorized access to the localhost port.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows an attacker with access to the localhost TCP port to achieve arbitrary code execution due to unsafe deserialization without authentication or signature verification. This can lead to unauthorized access, data breaches, or manipulation of sensitive information.
Such unauthorized access and potential data compromise can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches.
Can you explain this vulnerability to me?
This vulnerability is an unsafe deserialization issue in the MixPHP Framework versions 2.x through 2.2.17. Specifically, the sync-invoke TCP server receives data from a TCP socket and directly passes it to a PHP unserialize function without any authentication or signature verification. Because the server binds only to the localhost (127.0.0.1), an attacker with access to this TCP port can send a specially crafted serialized PHP closure. This crafted data is then executed, allowing the attacker to run arbitrary code on the server.
How can this vulnerability impact me? :
This vulnerability can have severe impacts as it allows an attacker with local access to the TCP port to execute arbitrary code on the affected system. This can lead to full compromise of the server, including unauthorized data access, modification, deletion, or disruption of services. Because there is no authentication or verification, the attacker can exploit this vulnerability without any user interaction or privileges.