← Retour aux CVEs
CVE-2026-27968
MEDIUM4.3
Description
Packistry is a self-hosted Composer repository designed to handle PHP package distribution. Prior to version 0.13.0, RepositoryAwareController::authorize() verified token presence and ability, but did not enforce token expiration. As a result, an expired deploy token with the correct ability could still access repository endpoints (e.g., Composer metadata/download APIs). The fix in version 0.13.0 adds an explicit expiration check, and tests now test expired deploy tokens to ensure they are rejected.
Details CVE
Score CVSS v3.14.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie2/26/2026
Derniere modification3/2/2026
Sourcenvd
Observations honeypot0
Produits affectes
packistryphp:packistry
Faiblesses (CWE)
CWE-287CWE-613CWE-613
References
https://github.com/packistry/packistry/commit/7740b48f0f4ecbe63099fb056c8a146180f8b283(security-advisories@github.com)
https://github.com/packistry/packistry/pull/276(security-advisories@github.com)
https://github.com/packistry/packistry/security/advisories/GHSA-4r9m-jp53-vgmw(security-advisories@github.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.