GHSA-x3c7-22c8-prg7

Suggest an improvement
Source
https://github.com/advisories/GHSA-x3c7-22c8-prg7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-x3c7-22c8-prg7/GHSA-x3c7-22c8-prg7.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-x3c7-22c8-prg7
Aliases
Published
2025-06-13T21:09:00Z
Modified
2025-06-14T01:17:17.741682Z
Severity
  • 3.9 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
handcraftedinthealps/goodby-csv has Potential Gadget Chain allowing Remote Code Execution
Details

Impact

goodby-csv could be used as part of a chain of methods that is exploitable when an insecure deserialization vulnerability exists in an application. This so-called "gadget chain" presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability.

Patches

Has the problem been patched? What versions should users upgrade to?

The problem is patched with Version 1.4.3

Workarounds

Patch src/Goodby/CSV/Export/Standard/Collection /CallbackCollection.php:

+    public function __wakeup() {
+       throw new \BadMethodCallException('Cannot unserialize ' . __CLASS__);
+    }

However, this is not directly exploitable; a separate vulnerability must be present to allow an attacker to pass unsafe input to unserialize(). There are no such known exploits in goodby-csv.

References

Are there any links users can visit to find out more?

Database specific
{
    "nvd_published_at": "2025-06-13T20:15:23Z",
    "cwe_ids": [
        "CWE-915"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2025-06-13T21:09:00Z",
    "severity": "LOW"
}
References

Affected packages

Packagist / handcraftedinthealps/goodby-csv

Package

Name
handcraftedinthealps/goodby-csv
Purl
pkg:composer/handcraftedinthealps/goodby-csv

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3

Affected versions

1.*

1.4.0
1.4.1
1.4.2