{"id":"CVE-2018-15133","details":"In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.","aliases":["GHSA-qvqm-h22r-4cp9"],"modified":"2026-04-10T04:06:38.568962Z","published":"2018-08-09T19:29:00.333Z","references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-15133"},{"type":"ADVISORY","url":"https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/laravel/framework","events":[{"introduced":"0"},{"last_affected":"d724ce0aa61bbd9adf658215eec484f5dd6711d6"},{"introduced":"56a58e0fa3d845bb992d7c64ac9bb6d0c24b745a"},{"last_affected":"acc6b5c54ab196d3358f60acc5f55d9ebaaccc02"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.5.40"},{"introduced":"5.6.0"},{"last_affected":"5.6.29"}]}}],"versions":["v4.0.0","v4.0.0-BETA2","v4.0.0-BETA3","v4.0.0-BETA4","v4.1.0","v5.5.0","v5.5.1","v5.5.10","v5.5.12","v5.5.13","v5.5.14","v5.5.15","v5.5.16","v5.5.17","v5.5.18","v5.5.19","v5.5.2","v5.5.20","v5.5.21","v5.5.22","v5.5.23","v5.5.24","v5.5.25","v5.5.26","v5.5.27","v5.5.28","v5.5.29","v5.5.3","v5.5.30","v5.5.31","v5.5.32","v5.5.33","v5.5.34","v5.5.35","v5.5.36","v5.5.37","v5.5.38","v5.5.39","v5.5.4","v5.5.40","v5.5.5","v5.5.6","v5.5.7","v5.5.9","v5.6.0","v5.6.1","v5.6.10","v5.6.11","v5.6.12","v5.6.13","v5.6.14","v5.6.15","v5.6.16","v5.6.17","v5.6.18","v5.6.19","v5.6.2","v5.6.20","v5.6.27","v5.6.28","v5.6.29","v5.6.3","v5.6.4","v5.6.5","v5.6.6","v5.6.7","v5.6.8","v5.6.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-15133.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}