An insecure deserialization vulnerability exists in the download.php script of the to3k Twittodon application through commit b1c58a7d1dc664b38deb486ca290779621342c0b (2023-02-28). The 'obj' parameter receives base64-encoded data that is passed directly to the unserialize() function without validation. This allows a remote, unauthenticated attacker to inject arbitrary PHP objects, leading to a denial of service.
References
| Link | Resource |
|---|---|
| https://github.com/solonbarroso/vulnerability-research/blob/main/advisories/Twittodon/CVE-2025-63950.md | Exploit Third Party Advisory |
| https://github.com/solonbarroso/vulnerability-research/blob/main/advisories/Twittodon/CVE-pending-Deserialization.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-18 21:15
Updated : 2025-12-31 19:32
NVD link : CVE-2025-63950
Mitre link : CVE-2025-63950
CVE.ORG link : CVE-2025-63950
JSON object : View
Products Affected
tomaszdunia
- twittodon
CWE
CWE-502
Deserialization of Untrusted Data
