Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,23 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-r3hf-q3mf-7h6w",
"modified": "2026-03-23T15:30:44Z",
"modified": "2026-03-23T15:30:45Z",
"published": "2026-03-23T15:30:44Z",
"aliases": [
"CVE-2026-4587"
],
"summary": "Improper SSL Certificate Validation in HybridAuth Curl HTTP Client",
"details": "A vulnerability was found in HybridAuth up to 3.12.2. This issue affects some unknown processing of the file src/HttpClient/Curl.php of the component SSL Handler. The manipulation of the argument curlOptions results in improper certificate validation. The attack can be launched remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The project was informed of the problem early through an issue report but has not responded yet.",
"severity": [
"severity": [],
"affected": [
Comment on lines +9 to +12
Copy link

Copilot AI Mar 23, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The PR description mentions updating CVSS v3/v4, but this change removes the existing CVSS entries and leaves severity empty. If CVSS vectors are known for this CVE, they should remain here (possibly updated), otherwise the PR description (or the data) should be corrected to avoid losing scoring information for consumers.

Copilot uses AI. Check for mistakes.
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
"package": {
"ecosystem": "Packagist",
"name": "hybridauth/hybridauth"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
Comment on lines +18 to +27
Copy link

Copilot AI Mar 23, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The affected range is currently unbounded (introduced: "0" with no corresponding fixed or last_affected event). In OSV semantics this indicates that all versions are affected indefinitely, which conflicts with the last_known_affected_version_range and the details saying the issue is only present up to a certain version. Please bound the range by adding an appropriate end event (last_affected or fixed) so automated version matching is accurate.

Copilot uses AI. Check for mistakes.
"database_specific": {
"last_known_affected_version_range": "< 3.12.2"
Copy link

Copilot AI Mar 23, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

database_specific.last_known_affected_version_range is set to < 3.12.2, but the advisory text says "up to 3.12.2" (which typically includes 3.12.2). Please align the version range expression with the described affected versions (e.g., <= 3.12.2 or an equivalent upper bound) so the metadata is internally consistent.

Suggested change
"last_known_affected_version_range": "< 3.12.2"
"last_known_affected_version_range": "<= 3.12.2"

Copilot uses AI. Check for mistakes.
}
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
Expand All @@ -28,7 +40,7 @@
"url": "https://github.com/hybridauth/hybridauth/issues/1444"
},
{
"type": "WEB",
"type": "PACKAGE",
"url": "https://github.com/hybridauth/hybridauth"
},
{
Expand Down
Loading