Cyber Posture

CVE-2026-37552

High

Published: 01 May 2026

Published
01 May 2026
Modified
07 May 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 31.0th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). No authentication or signature verification exists on the TCP…

more

connection. An attacker with access to the localhost TCP port (server binds 127.0.0.1) can send a crafted serialized PHP closure to achieve arbitrary code execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the unsafe deserialization flaw in MixPHP's sync-invoke TCP server to prevent arbitrary code execution.

prevent

Mandates validation of all incoming TCP socket data prior to unserialization, blocking crafted malicious PHP closures.

prevent

Limits system to least functionality by disabling or restricting the unnecessary unauthenticated localhost TCP server in the MixPHP Framework.

Security SummaryAI

CVE-2026-37552 is an unsafe deserialization vulnerability (CWE-502) affecting MixPHP Framework versions 2.x through 2.2.17. The issue resides in the sync-invoke TCP server implemented in Server.php at line 87, where data received from a TCP socket is directly passed to Opis\Closure\unserialize() and then executed via call_user_func(). No authentication or signature verification is performed on the incoming TCP connection, which binds exclusively to 127.0.0.1. The vulnerability carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete compromise.

An attacker requires local access to the TCP port on the target host (localhost only) to exploit this flaw. By sending a crafted serialized PHP closure over the TCP connection, the attacker can trigger arbitrary code execution with the privileges of the server process. This local attack vector assumes the adversary has already gained some foothold on the system, such as through another vulnerability or misconfiguration, enabling them to connect to the loopback interface and execute malicious payloads without user interaction or privileges.

References for further details include a GitHub Gist at https://gist.github.com/sgInnora/fa46386840fe978a30d7e53c458f2975 (likely containing a proof-of-concept), the main MixPHP repository at https://github.com/mix-php/mix, and the vulnerable Server.php source at https://github.com/mix-php/mix/blob/v2.2.17/src/sync-invoke/src/Server.php. No specific patch or mitigation guidance is detailed in the provided CVE information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The local unsafe deserialization vulnerability in the localhost-bound TCP service allows an attacker with initial system foothold to achieve arbitrary code execution as the server process via crafted PHP closures, directly enabling exploitation for privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References