GHSA-q745-cfqh-hcrw

Suggest an improvement
Source
https://github.com/advisories/GHSA-q745-cfqh-hcrw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-q745-cfqh-hcrw/GHSA-q745-cfqh-hcrw.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-q745-cfqh-hcrw
Aliases
Published
2025-07-11T15:31:39Z
Modified
2025-07-11T23:27:11.874790Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
phpThumb is vulnerable to Command Injection through its gif_outputAsJpeg function
Details

gif_outputAsJpeg in phpThumb through 1.7.23 allows phpthumb.gif.php OS Command Injection via a crafted parameter value. This is fixed in 1.7.23-202506081709.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2025-07-11T15:15:27Z",
    "cwe_ids": [
        "CWE-78"
    ],
    "github_reviewed_at": "2025-07-11T22:36:20Z",
    "severity": "MODERATE"
}
References

Affected packages

Packagist / james-heinrich/phpthumb

Package

Name
james-heinrich/phpthumb
Purl
pkg:composer/james-heinrich/phpthumb

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.7.23

Affected versions

v1.*

v1.7.12
v1.7.13
v1.7.14
v1.7.15
v1.7.16
v1.7.17
v1.7.18
v1.7.19
v1.7.20
v1.7.21
v1.7.22
v1.7.23