CVE-2022-24742
PHP vulnerability analysis and mitigation

Overview

CVE-2022-24742 affects Sylius, an open source eCommerce platform. The vulnerability was discovered in versions prior to 1.9.10, 1.10.11, and 1.11.2, where sensitive data remains accessible if a browser tab is left open after user logout. The issue was disclosed on March 14, 2022, and was fixed in versions 1.9.10, 1.10.11, and 1.11.2 (GitHub Release, GitHub Advisory).

Technical details

The vulnerability is classified with a CVSS v3.1 Base Score of 5.5 (Medium) with vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. It is categorized under CWE-668 (Exposure of Resource to Wrong Sphere) and CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The issue occurs when a user logs out but leaves the browser tab open, allowing potential attackers to use the browser's back button to view previously accessed content (NVD).

Impact

The vulnerability could lead to unauthorized access to sensitive information such as customer details and payment gateway configurations, but only for pages previously viewed by the administrator. While no active actions can be performed through this exposure, and any page refresh would block further access, it presents a significant data leak risk (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Sylius versions 1.9.10, 1.10.11, and 1.11.2. For unpatched systems, two workarounds are available: 1) Configure the application to strictly redirect to the login page when the browser back button is pressed, or 2) Implement more strict cache policies for restricted content by setting no-store cache control directives. These can be implemented through custom event subscribers and section resolvers (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13828CRITICAL9
  • PHPPHP
  • mautic/core
NoYesDec 02, 2025
CVE-2025-13827HIGH8.8
  • PHPPHP
  • mautic/grapes-js-builder-bundle
NoYesDec 02, 2025
CVE-2025-66468HIGH7.6
  • PHPPHP
  • aimeos/ai-cms-grapesjs
NoYesDec 02, 2025
CVE-2025-65657MEDIUM6.5
  • PHPPHP
  • feehi/cms
NoNoDec 02, 2025
CVE-2025-65186MEDIUM6.1
  • PHPPHP
  • getgrav/grav
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management