Vulnerability DatabaseGHSA-pcpm-vc4v-cmvx

GHSA-pcpm-vc4v-cmvx
PHP vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-pcpm-vc4v-cmvx) affects eZ Platform's role assignment functionality, discovered and disclosed on November 10, 2022. The issue affects eZ Platform versions v1.5., v2.3., and Ibexa DXP versions v3.3., v4.2., with patches released in versions v1.5.29, v2.3.26, and Ibexa DXP v3.3.28, v4.2.3 respectively. The vulnerability allows users with the Company admin role or those having role/assign policy to assign any role to any user, bypassing intended subtree limitations (GitHub Advisory, Ibexa Advisory).

Technical details

The vulnerability stems from a failure in the subtree limitation mechanism for role assignment policies. When a user has the role/assign policy, the system fails to enforce any configured subtree limitations, effectively allowing unrestricted role assignments. This particularly affects the Company admin role introduced in v4 of the platform, but extends to any user with role assignment capabilities (Ibexa Advisory).

Impact

The vulnerability allows affected users to assign any role to any user within the system, bypassing intended hierarchical restrictions. While this capability is typically limited to administrators, installations where role assignment permissions are more broadly distributed could face significant security implications through unauthorized privilege escalation (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in eZ Platform versions v1.5.29, v2.3.26, and Ibexa DXP versions v3.3.28, v4.2.3. Organizations should immediately upgrade to these versions or later to ensure subtree limitations are properly enforced. Additionally, it is recommended to audit existing role assignments and verify which users have role assignment capabilities in their installation (GitHub Advisory, Ibexa Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-898v-775g-777cCRITICAL9.4
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-5j8p-438x-rgg5CRITICAL9.3
  • PHPPHP
  • onelogin/php-saml
NoYesDec 09, 2025
GHSA-j8g6-5gqc-mq36HIGH8.2
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-pvcv-q3q7-266gHIGH8.1
  • PHPPHP
  • filament/filament
NoYesDec 09, 2025
GHSA-6w82-v552-wjw2HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management