🔐 CVE Alert

CVE-2014-125116

UNKNOWN 0.0

HybridAuth 2.0.9 - 2.2.2 Unauthenticated RCE via install.php Configuration Injection

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A remote code execution vulnerability exists in HybridAuth versions 2.0.9 through 2.2.2 due to insecure use of the install.php installation script. The script remains accessible after deployment and fails to sanitize input before writing to the application’s config.php file. An unauthenticated attacker can inject arbitrary PHP code into config.php, which is later executed when the file is loaded. This allows attackers to achieve remote code execution on the server. Exploitation of this issue will overwrite the existing configuration, rendering the application non-functional.

CWE CWE-434 CWE-306
Vendor hybridauth
Product hybridauth
Published Jul 25, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for hybridauth hybridauth

Be the first to know when new unknown vulnerabilities affecting hybridauth hybridauth are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

HybridAuth / HybridAuth
2.0.9 ≤ 2.2.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
exploit-db.com: https://www.exploit-db.com/exploits/34390 exploit-db.com: https://www.exploit-db.com/exploits/34273 raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/hybridauth_install_php_exec.rb vulners.com: https://vulners.com/metasploit/MSF:EXPLOIT-UNIX-WEBAPP-HYBRIDAUTH_INSTALL_PHP_EXEC- hybridauth.github.io: https://hybridauth.github.io/ vulncheck.com: https://www.vulncheck.com/advisories/hybridauth-unauth-rce-via-config-injection

Credits

Pichaya Morimoto