CVE-2024-24725

Gibbon through 26.0.00 allows remote authenticated users to conduct PHP deserialization attacks via columnOrder in a POST request to the modules/System%20Admin/import_run.php&type=externalAssessment&step=4 URI.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:*

History

29 Jul 2025, 20:05

Type Values Removed Values Added
CPE cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:*
First Time Gibbonedu
Gibbonedu gibbon
References () https://gibbonedu.org/download/ - () https://gibbonedu.org/download/ - Product
References () https://www.exploit-db.com/exploits/51903 - () https://www.exploit-db.com/exploits/51903 - Exploit

21 Nov 2024, 08:59

Type Values Removed Values Added
References () https://gibbonedu.org/download/ - () https://gibbonedu.org/download/ -
References () https://www.exploit-db.com/exploits/51903 - () https://www.exploit-db.com/exploits/51903 -

27 Aug 2024, 18:35

Type Values Removed Values Added
Summary
  • (es) Gibbon hasta la versión 26.0.00 permite a usuarios remotos autenticados realizar ataques de deserialización PHP a través de columnOrder en una solicitud POST al URI module/System%20Admin/import_run.php&type=externalAssessment&step=4.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-502

23 Mar 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-23 23:15

Updated : 2025-07-29 20:05


NVD link : CVE-2024-24725

Mitre link : CVE-2024-24725

CVE.ORG link : CVE-2024-24725


JSON object : View

Products Affected

gibbonedu

  • gibbon
CWE
CWE-502

Deserialization of Untrusted Data