Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 17 Mar 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mylittleforum
Mylittleforum my Little Forum |
|
| CPEs | cpe:2.3:a:mylittleforum:my_little_forum:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mylittleforum
Mylittleforum my Little Forum |
|
| Metrics |
cvssV3_1
|
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
My Little Forum
My Little Forum my Little Forum |
|
| Vendors & Products |
My Little Forum
My Little Forum my Little Forum |
Mon, 09 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | my little forum is a PHP and MySQL based internet forum that displays the messages in classical threaded view. Prior to 20260208.1, the application fails to filter the phar:// protocol in URL validation, allowing attackers to upload a malicious Phar Polyglot file (disguised as JPEG) via the image upload feature, trigger Phar deserialization through BBCode [img] tag processing, and exploit Smarty 4.1.0 POP chain to achieve arbitrary file deletion. This vulnerability is fixed in 20260208.1. | |
| Title | Phar Deserialization leading to Arbitrary File Deletion in my little forum | |
| Weaknesses | CWE-434 CWE-502 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-11T21:20:25.222Z
Reserved: 2026-02-09T16:22:17.785Z
Link: CVE-2026-25923
Updated: 2026-02-11T21:20:22.850Z
Status : Analyzed
Published: 2026-02-09T22:16:04.460
Modified: 2026-03-17T20:30:28.337
Link: CVE-2026-25923
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:15:27Z