Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Saloon
Saloon saloon |
|
| CPEs | cpe:2.3:a:saloon:saloon:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Saloon
Saloon saloon |
|
| Metrics |
cvssV3_1
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Saloonphp
Saloonphp saloon |
|
| Vendors & Products |
Saloonphp
Saloonphp saloon |
Thu, 26 Mar 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Saloon is a PHP library that gives users tools to build API integrations and SDKs. Versions prior to 4.0.0 used PHP's unserialize() in AccessTokenAuthenticator::unserialize() to restore OAuth token state from cache or storage, with allowed_classes => true. An attacker who can control the serialized string (e.g. by overwriting a cached token file or via another injection) can supply a serialized "gadget" object. When unserialize() runs, PHP instantiates that object and runs its magic methods (__wakeup, __destruct, etc.), leading to object injection. In environments with common dependencies (e.g. Monolog), this can be chained to remote code execution (RCE). The fix in version 4.0.0 removes PHP serialization from the AccessTokenAuthenticator class requiring users to store and resolve the authenticator manually. | |
| Title | Saloon has insecure deserialization in AccessTokenAuthenticator (object injection / RCE) | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-26T00:27:23.776Z
Reserved: 2026-03-24T19:50:52.104Z
Link: CVE-2026-33942
No data.
Status : Analyzed
Published: 2026-03-26T01:16:28.040
Modified: 2026-03-26T20:42:31.563
Link: CVE-2026-33942
No data.
OpenCVE Enrichment
Updated: 2026-03-26T12:08:56Z