Vulnerability Description
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. Prior to version 4.1.9, an improper input validation vulnerability allows attackers to execute CLI routes via HTTP request. Version 4.1.9 contains a patch. There are currently no known workarounds for this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Codeigniter | Codeigniter | >= 4.0.0, < 4.1.9 |
Related Weaknesses (CWE)
References
- https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35abaPatchThird Party Advisory
- https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-Third Party Advisory
- https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35abaPatchThird Party Advisory
- https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-Third Party Advisory
FAQ
What is CVE-2022-24711?
CVE-2022-24711 is a vulnerability with a CVSS score of 9.4 (CRITICAL). CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. Prior to version 4.1.9, an improper input validation vulnerability allows attackers to execute CLI routes via HTTP reques...
How severe is CVE-2022-24711?
CVE-2022-24711 has been rated CRITICAL with a CVSS base score of 9.4/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-24711?
Check the references section above for vendor advisories and patch information. Affected products include: Codeigniter Codeigniter.