Vulnerability DatabaseGHSA-42qm-8v8m-m78c

GHSA-42qm-8v8m-m78c
PHP vulnerability analysis and mitigation

Overview

A moderate severity vulnerability (GHSA-42qm-8v8m-m78c) was discovered in PocketMine MP affecting versions prior to 4.18.0-ALPHA2. The vulnerability was published on May 30, 2023, and involves uncontrolled resource consumption via mismatched type of 'InventoryTransactionPacket'. The issue affects the composer package pocketmine/pocketmine-mp and received a CVSS score of 5.3 (GitHub Advisory).

Technical details

The vulnerability stems from a 'mismatch' type InventoryTransactionPacket that clients send to request a resync of all currently open inventories. The core issue is that PocketMine-MP does not implement rate-limiting for these 'mismatch' transactions, and the inventory syncing process is not deferred until the end of the current tick. The vulnerability is classified with a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L), indicating network vector attack with low complexity and no required privileges or user interaction (GitHub Advisory).

Impact

When exploited, this vulnerability can be used as a bandwidth multiplier, causing the server to transmit many megabytes of data. This is particularly impactful when dealing with network serialized inventory items containing large amounts of NBT data. The vulnerability primarily affects server availability, though no confidentiality or integrity impacts have been reported (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 4.18.0-ALPHA2 alongside the introduction of the ItemStackRequest system implementation. For users unable to update immediately, a workaround exists where plugins can handle DataPacketReceiveEvent for InventoryTransactionPacket and check if the type is MismatchTransactionData, implementing a rate limit (e.g., maximum 1 per tick) (GitHub Advisory, PocketMine Changelog).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23622HIGH8.7
  • PHPPHP
  • alextselegidis/easyappointments
NoNoJan 15, 2026
CVE-2026-23493HIGH8.6
  • PHPPHP
  • pimcore/pimcore
NoYesJan 15, 2026
CVE-2026-23496MEDIUM5.4
  • PHPPHP
  • pimcore/web2print-tools-bundle
NoYesJan 15, 2026
CVE-2026-23495MEDIUM4.3
  • PHPPHP
  • pimcore/admin-ui-classic-bundle
NoYesJan 15, 2026
CVE-2026-23494MEDIUM4.3
  • PHPPHP
  • pimcore/pimcore
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management