CVE-2023-22488
PHP vulnerability analysis and mitigation

Overview

CVE-2023-22488 is a vulnerability in Flarum's notification system that was disclosed on January 10, 2023. The vulnerability affects Flarum/core package versions below 1.6.3 and allows unauthorized access to restricted content through the notifications feature. The issue occurs because the notification-sending component fails to verify if notification recipients have permission to view the notification subject, potentially exposing private content (Flarum Advisory).

Technical details

The vulnerability exists in the notification system where the notification-sending component bypasses access checks when delivering notifications. While alerts don't leak data due to visibility checks during listing, email notifications are sent without proper access verification. This allows users to bypass content restrictions by subscribing to discussions, particularly when the Subscriptions extension is enabled. The vulnerability has a CVSS v3.1 score of 6.8 (Moderate) with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N (Flarum Advisory).

Impact

The vulnerability allows attackers to access restricted content including posts awaiting approval, posts in tags the user has no access to, and posts restricted by third-party extensions. Users can bypass restrictions by subscribing to discussions before they become private. The impact extends to any notification subjects where features allow receiving notifications for restricted content (Flarum Advisory).

Mitigation and workarounds

The vulnerability has been patched in Flarum/core version 1.6.3. Users should upgrade immediately using the command 'composer update --prefer-dist --no-dev -a -W'. As a temporary workaround, administrators can either disable the Flarum Subscriptions extension or disable email notifications entirely. Version verification can be done using 'composer show flarum/core' (Flarum Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13828CRITICAL9
  • PHPPHP
  • mautic/core
NoYesDec 02, 2025
CVE-2025-13827HIGH8.8
  • PHPPHP
  • mautic/grapes-js-builder-bundle
NoYesDec 02, 2025
CVE-2025-66312MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025
CVE-2025-66311MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025
CVE-2025-66310MEDIUM6.2
  • PHPPHP
  • getgrav/grav
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management