๐Ÿ” CVE Alert

CVE-2026-27968

MEDIUM 4.3

Packistry accepts expired access tokens

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

Packistry is a self-hosted Composer repository designed to handle PHP package distribution. Prior to version 0.13.0, RepositoryAwareController::authorize() verified token presence and ability, but did not enforce token expiration. As a result, an expired deploy token with the correct ability could still access repository endpoints (e.g., Composer metadata/download APIs). The fix in version 0.13.0 adds an explicit expiration check, and tests now test expired deploy tokens to ensure they are rejected.

CWE CWE-287 CWE-613
Vendor packistry
Product packistry
Published Feb 26, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for packistry packistry

Be the first to know when new medium vulnerabilities affecting packistry packistry are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

packistry / packistry
< 0.13.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/packistry/packistry/security/advisories/GHSA-4r9m-jp53-vgmw github.com: https://github.com/packistry/packistry/pull/276 github.com: https://github.com/packistry/packistry/commit/7740b48f0f4ecbe63099fb056c8a146180f8b283