First published: Sat Feb 26 2022(Updated: )
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A vulnerability in versions prior to 4.1.9 might allow remote attackers to bypass the CodeIgniter4 Cross-Site Request Forgery (CSRF) protection mechanism. Users should upgrade to version 4.1.9. There are workarounds for this vulnerability, but users will still need to code as these after upgrading to v4.1.9. Otherwise, the CSRF protection may be bypassed. If auto-routing is enabled, check the request method in the controller method before processing. If auto-routing is disabled, either avoid using `$routes->add()` and instead use HTTP verbs in routes; or check the request method in the controller method before processing.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/codeigniter4/framework | <4.1.9 | |
Codeigniter Codeigniter | >=4.0.0<4.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24712 is a Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4.
CVE-2022-24712 affects versions prior to 4.1.9 of CodeIgniter4.
Remote attackers can exploit CVE-2022-24712 to bypass the CodeIgniter4 Cross-Site Request Forgery (CSRF) protection mechanism.
CVE-2022-24712 has a severity score of 8.8 (High).
To fix CVE-2022-24712, users should upgrade to version 4.1.9 of CodeIgniter4.