Vulnerability DatabaseGHSA-h79x-98r2-g6qc

GHSA-h79x-98r2-g6qc
PHP vulnerability analysis and mitigation

Overview

A moderate severity vulnerability (GHSA-h79x-98r2-g6qc) was discovered in PocketMine-MP versions 3.0.0 to 4.0.0, affecting the XBOX Live authentication system. The vulnerability, published on January 21, 2022, allows attackers to impersonate other users through login theft, particularly affecting servers that are directly accessible via the internet. The issue stems from the incomplete implementation of Minecraft Bedrock authentication protocol encryption in PocketMine-MP 3.x versions (GitHub Advisory).

Technical details

The vulnerability exploits the separation between authentication and protocol encryption in the Minecraft Bedrock protocol. While the client generates a private ECC key (clientPriv) and receives a JWT containing the public key (clientPub) signed by Microsoft servers, the server only verifies the token's signature without confirming the client's possession of the private key. This enables login replay attacks where attackers can use captured login credentials that remain valid for 2-3 days after issuance. The vulnerability has a CVSS score of 4.7, with attack vector classified as Network and attack complexity as High (GitHub Advisory).

Impact

The vulnerability enables attackers to impersonate legitimate users on affected PocketMine-MP servers by capturing and replaying login credentials. This security breach primarily affects servers that are directly connected to the internet without proxy protection. The impact is limited by the JWT expiration dates, typically lasting 2-3 days after token issuance by XBOX servers (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in PocketMine-MP version 4.0.0 and version 3.27.0 through the implementation of Minecraft protocol encryption. For servers unable to update immediately, recommended workarounds include using an encryption-supporting proxy like gophertunnel between the server and players, configuring the server to accept connections only from the proxy (using server-ip=127.0.0.1 for local proxies), and verifying the LoginPacket serverAddress field matches the server's exposed domain name (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21857HIGH8.3
  • PHPPHP
  • redaxo/source
NoYesJan 07, 2026
CVE-2025-61676MEDIUM6.1
  • PHPPHP
  • october/system
NoYesJan 10, 2026
CVE-2025-61674MEDIUM6.1
  • PHPPHP
  • october/system
NoYesJan 10, 2026
CVE-2026-21896MEDIUM5.8
  • PHPPHP
  • getkirby/cms
NoYesJan 08, 2026
CVE-2026-22242MEDIUM4.9
  • PHPPHP
  • coreshop/core-shop
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management