← Back to CVEs
CVE-2023-36825
CRITICAL9.6
Description
Orchid is a Laravel package that allows application development of back-office applications, admin/user panels, and dashboards. A vulnerability present starting in version 14.0.0-alpha4 and prior to version 14.5.0 is related to the deserialization of untrusted data from the `_state` query parameter, which can result in remote code execution. The issue has been addressed in version 14.5.0. Users are advised to upgrade their software to this version or any subsequent versions that include the patch. There are no known workarounds.
CVE Details
CVSS v3.1 Score9.6
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published7/11/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
orchid:platform
Weaknesses (CWE)
CWE-502
References
https://github.com/orchidsoftware/platform/releases/tag/14.5.0(security-advisories@github.com)
https://github.com/orchidsoftware/platform/security/advisories/GHSA-ph6g-p72v-pc3p(security-advisories@github.com)
https://github.com/orchidsoftware/platform/releases/tag/14.5.0(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/orchidsoftware/platform/security/advisories/GHSA-ph6g-p72v-pc3p(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.