๐Ÿ” CVE Alert

CVE-2026-33942

UNKNOWN 0.0

Saloon has insecure deserialization in AccessTokenAuthenticator (object injection / RCE)

CVSS Score
0.0
EPSS Score
0.3%
EPSS Percentile
55th

Saloon is a PHP library that gives users tools to build API integrations and SDKs. Versions prior to 4.0.0 used PHP's unserialize() in AccessTokenAuthenticator::unserialize() to restore OAuth token state from cache or storage, with allowed_classes => true. An attacker who can control the serialized string (e.g. by overwriting a cached token file or via another injection) can supply a serialized "gadget" object. When unserialize() runs, PHP instantiates that object and runs its magic methods (__wakeup, __destruct, etc.), leading to object injection. In environments with common dependencies (e.g. Monolog), this can be chained to remote code execution (RCE). The fix in version 4.0.0 removes PHP serialization from the AccessTokenAuthenticator class requiring users to store and resolve the authenticator manually.

CWE CWE-502
Vendor saloonphp
Product saloon
Published Mar 26, 2026
Last Updated Mar 28, 2026
Stay Ahead of the Next One

Get instant alerts for saloonphp saloon

Be the first to know when new unknown vulnerabilities affecting saloonphp saloon are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

saloonphp / saloon
< 4.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/saloonphp/saloon/security/advisories/GHSA-rf88-776r-rcq9 docs.saloon.dev: https://docs.saloon.dev/upgrade/upgrading-from-v3-to-v4