| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4rm2-28vj-fj39 | Scramble vulnerable to remote code execution via evaluation of user-controlled input in validation rules |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dedoc
Dedoc scramble |
|
| Vendors & Products |
Dedoc
Dedoc scramble |
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Scramble generates API documentation for Laravel project. From 0.13.2 to before 0.13.22, when documentation endpoints are publicly accessible and validation rules reference user-controlled input, request supplied data may be evaluated during documentation generation, leading to execution of arbitrary PHP code in the application context. This vulnerability is fixed in 0.13.22. | |
| Title | Scramble: Remote code execution via evaluation of user-controlled input in validation rules | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:53:20.142Z
Reserved: 2026-05-05T16:33:55.844Z
Link: CVE-2026-44262
Updated: 2026-05-13T14:53:12.955Z
Status : Deferred
Published: 2026-05-12T22:16:36.563
Modified: 2026-05-13T16:10:57.817
Link: CVE-2026-44262
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:35:40Z
Github GHSA