Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4rm2-28vj-fj39 | Scramble vulnerable to remote code execution via evaluation of user-controlled input in validation rules |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dedoc
Dedoc scramble |
|
| Vendors & Products |
Dedoc
Dedoc scramble |
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Scramble generates API documentation for Laravel project. From 0.13.2 to before 0.13.22, when documentation endpoints are publicly accessible and validation rules reference user-controlled input, request supplied data may be evaluated during documentation generation, leading to execution of arbitrary PHP code in the application context. This vulnerability is fixed in 0.13.22. | |
| Title | Scramble: Remote code execution via evaluation of user-controlled input in validation rules | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:53:20.142Z
Reserved: 2026-05-05T16:33:55.844Z
Link: CVE-2026-44262
Updated: 2026-05-13T14:53:12.955Z
Status : Deferred
Published: 2026-05-12T22:16:36.563
Modified: 2026-05-13T16:10:57.817
Link: CVE-2026-44262
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:35:40Z
Github GHSA