| Title | Aidigu <=1.8.2 PHP object deserialization |
|---|
| Description | Aidigu (≤1.8.2) suffers from an arbitrary PHP object deserialization vulnerability in application/common.php, where untrusted cookie data is unserialized without validation. Attackers can exploit this to achieve remote code execution on the server by sending a specially crafted serialized payload in the rememberMe cookie. |
|---|
| Source | ⚠️ https://note-hxlab.wetolink.com/share/Bon2P1OSuNDc |
|---|
| User | YELEIPENG (UID 73615) |
|---|
| Submission | 07/03/2025 05:36 (10 months ago) |
|---|
| Moderation | 07/07/2025 15:26 (4 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 315165 [lty628 Aidigu up to 1.8.2 PHP Object /application/common.php checkUserCookie rememberMe deserialization] |
|---|
| Points | 19 |
|---|