Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 31 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tomaszdunia
Tomaszdunia twittodon |
|
| CPEs | cpe:2.3:a:tomaszdunia:twittodon:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tomaszdunia
Tomaszdunia twittodon |
Thu, 18 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insecure deserialization vulnerability exists in the download.php script of the to3k Twittodon application through commit b1c58a7d1dc664b38deb486ca290779621342c0b (2023-02-28). The 'obj' parameter receives base64-encoded data that is passed directly to the unserialize() function without validation. This allows a remote, unauthenticated attacker to inject arbitrary PHP objects, leading to a denial of service. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-18T21:20:56.473Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63950
Updated: 2025-12-18T21:20:53.747Z
Status : Analyzed
Published: 2025-12-18T21:15:54.970
Modified: 2025-12-31T19:32:50.907
Link: CVE-2025-63950
No data.
OpenCVE Enrichment
No data.