Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). No authentication or signature verification exists on the TCP connection. An attacker with access to the localhost TCP port (server binds 127.0.0.1) can send a crafted serialized PHP closure to achieve arbitrary code execution.
History

Fri, 01 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). No authentication or signature verification exists on the TCP connection. An attacker with access to the localhost TCP port (server binds 127.0.0.1) can send a crafted serialized PHP closure to achieve arbitrary code execution.
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:U/UI:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-01T19:45:48.969Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37552

cve-icon Vulnrichment

Updated: 2026-05-01T19:38:44.093Z

cve-icon NVD

Status : Received

Published: 2026-05-01T16:16:30.917

Modified: 2026-05-01T20:16:23.680

Link: CVE-2026-37552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.