Loading HuntDB...

GHSA-m6m8-6gq8-c9fj

GitHub Security Advisory

Remote Code Execution Vulnerability in Validation Placeholders in CodeIgniter4

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact
This vulnerability allows attackers to execute arbitrary code when you use Validation Placeholders.

The vulnerability exists in the Validation library, and validation methods in the controller and in-model validation are also vulnerable because they use the Validation library internally.

### Patches
Upgrade to v4.3.5 or later.

### Workarounds
Setting validation rules with an array.

E.g.:
```php
$validation->setRules([
'email' => ['required', 'valid_email, 'is_unique[users.email,id,{id}]'],
]);
```

### References
- https://codeigniter4.github.io/userguide/libraries/validation.html#validation-placeholders
- https://codeigniter4.github.io/userguide/incoming/controllers.html#validating-data
- https://codeigniter4.github.io/userguide/models/model.html#in-model-validation

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)

Affected Packages

Packagist codeigniter4/framework
Affected versions: 0 (fixed in 4.3.5)

Related CVEs

Key Information

GHSA ID
GHSA-m6m8-6gq8-c9fj
Published
May 22, 2023 7:49 PM
Last Modified
October 24, 2023 10:50 PM
CVSS Score
9.0 /10
Primary Ecosystem
Packagist
Primary Package
codeigniter4/framework
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.