A remote code execution vulnerability exists in HybridAuth versions 2.0.9 through 2.2.2 due to insecure use of the install.php installation script. The script remains accessible after deployment and fails to sanitize input before writing to the application’s config.php file. An unauthenticated attacker can inject arbitrary PHP code into config.php, which is later executed when the file is loaded. This allows attackers to achieve remote code execution on the server. Exploitation of this issue will overwrite the existing configuration, rendering the application non-functional.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote code execution vulnerability exists in HybridAuth versions 2.0.9 through 2.2.2 due to insecure use of the install.php installation script. The script remains accessible after deployment and fails to sanitize input before writing to the application’s config.php file. An unauthenticated attacker can inject arbitrary PHP code into config.php, which is later executed when the file is loaded. This allows attackers to achieve remote code execution on the server. Exploitation of this issue will overwrite the existing configuration, rendering the application non-functional. | |
Title | HybridAuth 2.0.9 - 2.2.2 Unauthenticated RCE via install.php Configuration Injection | |
Weaknesses | CWE-306 CWE-434 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-25T15:51:57.134Z
Updated: 2025-07-29T13:52:42.262Z
Reserved: 2025-07-24T20:21:27.342Z
Link: CVE-2014-125116

Updated: 2025-07-29T13:52:29.587Z

Status : Awaiting Analysis
Published: 2025-07-25T16:15:26.053
Modified: 2025-07-29T14:15:34.137
Link: CVE-2014-125116

No data.