diff --git a/advisories/unreviewed/2026/03/GHSA-r3hf-q3mf-7h6w/GHSA-r3hf-q3mf-7h6w.json b/advisories/unreviewed/2026/03/GHSA-r3hf-q3mf-7h6w/GHSA-r3hf-q3mf-7h6w.json index eb1bb534aa7b3..cac50f35e7ed3 100644 --- a/advisories/unreviewed/2026/03/GHSA-r3hf-q3mf-7h6w/GHSA-r3hf-q3mf-7h6w.json +++ b/advisories/unreviewed/2026/03/GHSA-r3hf-q3mf-7h6w/GHSA-r3hf-q3mf-7h6w.json @@ -1,23 +1,35 @@ { "schema_version": "1.4.0", "id": "GHSA-r3hf-q3mf-7h6w", - "modified": "2026-03-23T15:30:44Z", + "modified": "2026-03-23T15:30:45Z", "published": "2026-03-23T15:30:44Z", "aliases": [ "CVE-2026-4587" ], + "summary": "Improper SSL Certificate Validation in HybridAuth Curl HTTP Client", "details": "A vulnerability was found in HybridAuth up to 3.12.2. This issue affects some unknown processing of the file src/HttpClient/Curl.php of the component SSL Handler. The manipulation of the argument curlOptions results in improper certificate validation. The attack can be launched remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The project was informed of the problem early through an issue report but has not responded yet.", - "severity": [ + "severity": [], + "affected": [ { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" - }, - { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "package": { + "ecosystem": "Packagist", + "name": "hybridauth/hybridauth" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "< 3.12.2" + } } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -28,7 +40,7 @@ "url": "https://github.com/hybridauth/hybridauth/issues/1444" }, { - "type": "WEB", + "type": "PACKAGE", "url": "https://github.com/hybridauth/hybridauth" }, {