Vulnerability DatabaseGHSA-2x4v-g8cx-jxrq

GHSA-2x4v-g8cx-jxrq
PHP vulnerability analysis and mitigation

Overview

A critical timing attack vulnerability was identified in Ibexa DXP's login system, tracked as GHSA-2x4v-g8cx-jxrq. The vulnerability affects ibexa/core versions 4.0.0 through 4.0.7 and 4.1.0 through 4.1.4. This security issue was discovered and responsibly disclosed by Christoph Rottermanner and Jonas Roller from it.sec, with the public disclosure occurring on May 31, 2022 (Ibexa Advisory, GitHub Advisory).

Technical details

The vulnerability stems from an inadequate implementation of random execution time mechanisms intended to prevent timing attacks against user accounts. The system's attempt to hinder timing-based account enumeration was found to be insufficient in certain scenarios. This vulnerability is classified as CWE-208 and has been assigned a Critical severity rating (GitHub Advisory).

Impact

The vulnerability could allow attackers to discover whether specific user accounts exist in the system without knowing their passwords, potentially compromising user privacy and enabling targeted attacks (Ibexa Advisory).

Mitigation and workarounds

The issue has been patched in versions 4.0.7 and 4.1.4 of ibexa/core. The fix implements constant time functionality, configured through a new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. The system will log a warning if the constant time is exceeded, in which case the setting should be increased (Ibexa Advisory).

Community reactions

The vulnerability was discovered by security researchers from it.sec, a consulting company founded in 1996 that specializes in information security, IT compliance & data protection, and IT forensics/discovery. Their responsible disclosure contributed to addressing this security concern before it could be widely exploited (Ibexa Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23622HIGH8.7
  • PHPPHP
  • alextselegidis/easyappointments
NoNoJan 15, 2026
CVE-2026-23493HIGH8.6
  • PHPPHP
  • pimcore/pimcore
NoYesJan 15, 2026
CVE-2026-23496MEDIUM5.4
  • PHPPHP
  • pimcore/web2print-tools-bundle
NoYesJan 15, 2026
CVE-2026-23495MEDIUM4.3
  • PHPPHP
  • pimcore/admin-ui-classic-bundle
NoYesJan 15, 2026
CVE-2026-23494MEDIUM4.3
  • PHPPHP
  • pimcore/pimcore
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management