CVE-2024-25108
PHP vulnerability analysis and mitigation

Overview

Pixelfed, an open source photo sharing platform, disclosed a critical vulnerability (CVE-2024-25108) affecting versions between v0.10.4 and v0.11.9. The vulnerability was discovered and reported on February 10, 2024, and involves improper authorization checks when processing requests, allowing attackers to access administrative and moderator functionality beyond their intended permissions (GitHub Advisory).

Technical details

The vulnerability stems from insufficient authorization checks in the API implementation. When verifying request permissions, the system only validated user authentication via access token and resource ownership/admin status, without properly checking if the OAuth Application/Client had been granted access to specific API endpoints. This implementation flaw allows an access token with 'read' permissions to be used for 'write' or administrative actions without the user's knowledge. The vulnerability has been assigned a CVSS v3.1 base score of 9.9 CRITICAL (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L) (NVD).

Impact

The vulnerability affects all local users of Pixelfed servers and can potentially compromise server federation capabilities. Access tokens in Pixelfed have a 1-year lifetime, allowing attackers to conduct delayed attacks even after initial access is granted. Additionally, any leaked access tokens from third-party OAuth Application databases could be exploited for an extended period (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.11.11. Users are strongly advised to upgrade to this version as there are no known workarounds for this vulnerability. The patch implements proper OAuth authorization checks on API endpoints (GitHub Patch).

Community reactions

The investigation and remediation of this security vulnerability were supported by the Nivenly Foundation, demonstrating industry collaboration in addressing security issues in the Fediverse and Pixelfed communities (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23622HIGH8.7
  • PHPPHP
  • alextselegidis/easyappointments
NoNoJan 15, 2026
CVE-2026-23493HIGH8.6
  • PHPPHP
  • pimcore/pimcore
NoYesJan 15, 2026
CVE-2026-23496MEDIUM5.4
  • PHPPHP
  • pimcore/web2print-tools-bundle
NoYesJan 15, 2026
CVE-2026-23495MEDIUM4.3
  • PHPPHP
  • pimcore/admin-ui-classic-bundle
NoYesJan 15, 2026
CVE-2026-23494MEDIUM4.3
  • PHPPHP
  • pimcore/pimcore
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management