Cyber Posture

CVE-2026-27206

High

Published: 21 February 2026

Published
21 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 34.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified in the…

more

@type field without restriction. When processing untrusted JSON input, this behavior may allow an attacker to instantiate arbitrary classes available in the application. If a vulnerable application passes attacker-controlled JSON into JsonSerializer::unserialize() and contains classes with dangerous magic methods (such as __wakeup() or __destruct()), this may lead to PHP Object Injection and potentially Remote Code Execution (RCE), depending on available gadget chains in the application or its dependencies. This behavior is similar in risk profile to PHP's native unserialize() when used without the allowed_classes restriction. Applications are impacted only if untrusted or attacker-controlled JSON is passed into JsonSerializer::unserialize() and the application or its dependencies contain classes that can be leveraged as a gadget chain. This issue has been fixed in version 3.2.3. If an immediate upgrade isn't feasible, mitigate the vulnerability by never deserializing untrusted JSON with JsonSerializer::unserialize(), validating and sanitizing all JSON input before deserialization, and disabling @type-based object instantiation wherever possible.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the deserialization vulnerability in Zumba Json Serializer versions 3.2.2 and below by requiring timely patching to the fixed version 3.2.3.

prevent

Prevents PHP Object Injection by validating and sanitizing untrusted JSON inputs prior to processing with JsonSerializer::unserialize(), blocking malicious @type fields.

prevent

Restricts usage of vulnerable software like Zumba Json Serializer 3.2.2 and below by authorizing only approved, patched versions on the system.

Security SummaryAI

CVE-2026-27206 affects the Zumba Json Serializer library, a PHP tool for serializing variables into JSON format, specifically in versions 3.2.2 and below. The vulnerability stems from the library's deserializer, which uses a special @type field in JSON input to instantiate arbitrary PHP classes without any restrictions. This enables PHP Object Injection when processing untrusted JSON via the JsonSerializer::unserialize() method, particularly if the application or its dependencies include classes with dangerous magic methods like __wakeup() or __destruct() that can be chained into exploits. The issue mirrors risks in PHP's native unserialize() function without allowed_classes restrictions and carries a CVSS v3.1 score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-502 (Deserialization of Untrusted Data).

Remote attackers can exploit this vulnerability by supplying malicious JSON input to applications that invoke JsonSerializer::unserialize() on untrusted data, such as from user submissions or external APIs. No privileges or user interaction are required, though exploitation demands some complexity, like crafting a valid gadget chain from available classes. Successful attacks can result in high-impact confidentiality, integrity, and availability violations, potentially escalating to remote code execution (RCE) depending on the application's codebase and dependencies.

The vulnerability was fixed in version 3.2.3 of the library, as detailed in the GitHub security advisory (GHSA-v7m3-fpcr-h7m2), release notes, and the patching commit. Advisories recommend immediate upgrades where possible and interim mitigations including avoiding deserialization of untrusted JSON with JsonSerializer::unserialize(), validating and sanitizing all JSON input prior to processing, and disabling @type-based object instantiation. Applications are only impacted if they process attacker-controlled JSON in this manner.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables remote exploitation of a public-facing PHP application via deserialization of untrusted JSON, leading to PHP Object Injection and potential RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References