Vulnerability DatabaseGHSA-j5qg-w9jg-3wg3

GHSA-j5qg-w9jg-3wg3
PHP vulnerability analysis and mitigation

Overview

A security vulnerability (GHSA-j5qg-w9jg-3wg3) was discovered in PocketMine-MP versions prior to 4.0.3, affecting the operator (op) permission system. The vulnerability allowed players to make themselves impossible to de-op through commands by adding their name to ops.txt with uppercase letters. This issue was originally reported in iTXTech/Genisys and was patched in PocketMine-MP version 4.0.3 (GitHub Advisory).

Technical details

The vulnerability stems from how operator permissions were checked using Config->exists() with lowercase=true parameter. When a player's name was added to ops.txt with uppercase letters, the deop command would only remove the lowercase version of the name, leaving the uppercase version intact. This occurred because the permission check would match the lowercase version, but the actual removal operation wouldn't affect the uppercase entry (GitHub Advisory). The vulnerability has been assigned a CVSS score of 3.3 (Low severity) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (GitHub Advisory).

Impact

The vulnerability allowed players to maintain operator privileges even after administrators attempted to remove them through the deop command. For example, if a player named 'PotterHarry98' was listed in ops.txt, using the command 'deop PotterHarry98' would only remove 'potterharry98' from ops.txt while leaving 'PotterHarry98' intact, effectively maintaining their operator status (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in PocketMine-MP version 4.0.3. For affected versions, administrators can manually remove the problematic entries from the ops.txt file as a workaround. The permanent fix implemented in version 4.0.3 modifies the operator removal process to check for and remove entries regardless of letter case (GitHub Advisory, PocketMine Commit).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23622HIGH8.7
  • PHPPHP
  • alextselegidis/easyappointments
NoNoJan 15, 2026
CVE-2025-14894HIGH7.5
  • PHPPHP
  • livewire-filemanager/filemanager
NoNoJan 16, 2026
CVE-2026-23626MEDIUM6.8
  • PHPPHP
  • kimai/kimai
NoYesJan 18, 2026
CVE-2025-69198MEDIUM6
  • PHPPHP
  • pterodactyl/panel
NoYesJan 19, 2026
CVE-2026-23496MEDIUM5.4
  • PHPPHP
  • pimcore/web2print-tools-bundle
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management