Scramble generates API documentation for Laravel project. From 0.13.2 to before 0.13.22, when documentation endpoints are publicly accessible and validation rules reference user-controlled input, request supplied data may be evaluated during documentation generation, leading to execution of arbitrary PHP code in the application context. This vulnerability is fixed in 0.13.22.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4rm2-28vj-fj39 | Scramble vulnerable to remote code execution via evaluation of user-controlled input in validation rules |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Scramble generates API documentation for Laravel project. From 0.13.2 to before 0.13.22, when documentation endpoints are publicly accessible and validation rules reference user-controlled input, request supplied data may be evaluated during documentation generation, leading to execution of arbitrary PHP code in the application context. This vulnerability is fixed in 0.13.22. | |
| Title | Scramble: Remote code execution via evaluation of user-controlled input in validation rules | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T20:56:01.046Z
Reserved: 2026-05-05T16:33:55.844Z
Link: CVE-2026-44262
No data.
Status : Received
Published: 2026-05-12T22:16:36.563
Modified: 2026-05-12T22:16:36.563
Link: CVE-2026-44262
No data.
OpenCVE Enrichment
Updated: 2026-05-12T23:00:12Z
Weaknesses
Github GHSA