Loading HuntDB...

GHSA-r67m-m8c7-jp83

GitHub Security Advisory

Cachet vulnerable to forced reinstall

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact

Authenticated users, regardless of their privileges (_User_ or _Admin_), can trick Cachet and install the instance again, leading to arbitrary code execution on the server.

### Patches

This issue was addressed by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name.

### Workarounds

Only allow trusted source IP addresses to access to the administration dashboard.

### References

- https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection

### For more information

If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository.

Affected Packages

Packagist cachethq/cachet
Affected versions: 0 (fixed in 2.5.1)

Related CVEs

Key Information

GHSA ID
GHSA-r67m-m8c7-jp83
Published
August 30, 2021 4:11 PM
Last Modified
August 16, 2022 6:40 PM
CVSS Score
7.5 /10
Primary Ecosystem
Packagist
Primary Package
cachethq/cachet
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 29, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.