CVE-2014-125116
HybridAuth 2.0.9 - 2.2.2 Unauthenticated RCE via install.php Configuration Injection
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A remote code execution vulnerability exists in HybridAuth versions 2.0.9 through 2.2.2 due to insecure use of the install.php installation script. The script remains accessible after deployment and fails to sanitize input before writing to the application’s config.php file. An unauthenticated attacker can inject arbitrary PHP code into config.php, which is later executed when the file is loaded. This allows attackers to achieve remote code execution on the server. Exploitation of this issue will overwrite the existing configuration, rendering the application non-functional.
| CWE | CWE-434 CWE-306 |
| Vendor | hybridauth |
| Product | hybridauth |
| Published | Jul 25, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for hybridauth hybridauth
Be the first to know when new unknown vulnerabilities affecting hybridauth hybridauth are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
HybridAuth / HybridAuth
2.0.9 ≤ 2.2.2
References
exploit-db.com: https://www.exploit-db.com/exploits/34390 exploit-db.com: https://www.exploit-db.com/exploits/34273 raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/hybridauth_install_php_exec.rb vulners.com: https://vulners.com/metasploit/MSF:EXPLOIT-UNIX-WEBAPP-HYBRIDAUTH_INSTALL_PHP_EXEC- hybridauth.github.io: https://hybridauth.github.io/ vulncheck.com: https://www.vulncheck.com/advisories/hybridauth-unauth-rce-via-config-injection
Credits
Pichaya Morimoto