Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qrch-52m5-vv85 | Flight vulnerable to sensitive information disclosure via default error handler |
Fri, 15 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flightphp
Flightphp core |
|
| Vendors & Products |
Flightphp
Flightphp core |
Wed, 13 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flight is an extensible micro-framework for PHP. Prior to 3.18.1, the default error handler Engine::_error() writes the full exception message, exception code, and stack trace (including absolute filesystem paths) directly into the HTTP 500 response, with no debug gating. Production deployments leak internal paths, any secret interpolated into an exception message, and full module structure — giving attackers primitives for chaining other weaknesses (LFI, path traversal). This vulnerability is fixed in 3.18.1. | |
| Title | Flight: Sensitive information disclosure via default error handler in flightphp/core | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T18:49:21.316Z
Reserved: 2026-04-28T16:56:50.191Z
Link: CVE-2026-42552
Updated: 2026-05-15T18:47:53.468Z
Status : Deferred
Published: 2026-05-13T20:16:22.323
Modified: 2026-05-15T19:16:58.507
Link: CVE-2026-42552
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:36Z
Github GHSA