CVE-2026-42473
Unsafe Deserialization in MixPHP Framework 2.x
Publication date: 2026-05-01
Last updated on: 2026-05-05
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mixphp | framework | From 2.0.0 (inc) to 2.2.17 (inc) |
| mixphp | mixphp | From 2.0.0 (inc) to 2.2.17 (inc) |
| mixphp | framework | From 2.0 (inc) to 2.2.17 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unsafe deserialization issue in the MixPHP Framework versions 2.x through 2.2.17. Specifically, the session and cache handlers use the PHP function unserialize() on data that is read from the filesystem within the FileHandler object. Using unserialize() on untrusted or tampered data can lead to security risks.
How can this vulnerability impact me? :
Unsafe deserialization vulnerabilities can allow attackers to execute arbitrary code, manipulate application logic, or cause denial of service by injecting malicious serialized data. Since the MixPHP Framework unserializes data from the filesystem without proper validation, an attacker who can modify this data could exploit this to compromise the application.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The CVE-2026-42473 vulnerability involves unsafe deserialization in the MixPHP Framework, which can lead to remote code execution if exploited. Such a vulnerability can potentially allow unauthorized access or manipulation of sensitive data stored in sessions or caches.
While the provided context does not explicitly mention compliance impacts, vulnerabilities that enable unauthorized access or data manipulation can affect compliance with standards like GDPR and HIPAA, which require protection of personal and sensitive data.
Therefore, exploitation of this vulnerability could lead to breaches of confidentiality, integrity, and availability of data, potentially resulting in non-compliance with these regulations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves unsafe deserialization in the MixPHP Framework 2.x through 2.2.17, specifically in the session and cache handlers using unserialize() on filesystem data. Detection would involve identifying if your system is running a vulnerable version of MixPHP and monitoring for suspicious unserialize() usage or unexpected file modifications in session or cache storage.
Since the vulnerability is related to deserialization of data from the filesystem, you can check for the presence of vulnerable MixPHP versions by inspecting the installed framework version.
- Check the MixPHP version in your project files or composer.lock to confirm if it is 2.x through 2.2.17.
- Search for usage of unserialize() in session or cache handlers in your codebase, especially in the FileHandler object.
- Monitor filesystem access logs for unexpected reads or writes to session or cache files.
Example commands to assist detection might include:
- grep -r 'unserialize' /path/to/mixphp/
- grep -i 'version' /path/to/mixphp/composer.lock
- find /path/to/session/cache -type f -exec ls -l {} \;
What immediate steps should I take to mitigate this vulnerability?
To mitigate this unsafe deserialization vulnerability in MixPHP Framework versions 2.x through 2.2.17, immediate steps include:
- Upgrade MixPHP to a version later than 2.2.17 where the vulnerability is fixed.
- If an upgrade is not immediately possible, restrict access to the filesystem locations used for session and cache storage to prevent unauthorized modification.
- Implement input validation or filtering to avoid unserializing untrusted data.
- Monitor logs for suspicious activity related to session or cache file access.
These steps help reduce the risk of exploitation by limiting exposure to unsafe unserialize() calls on filesystem data.