CVE-2026-33942 PUBLISHED

Saloon has insecure deserialization in AccessTokenAuthenticator (object injection / RCE)

Assigner: GitHub_M
Reserved: 24.03.2026 Published: 26.03.2026 Updated: 26.03.2026

Saloon is a PHP library that gives users tools to build API integrations and SDKs. Versions prior to 4.0.0 used PHP's unserialize() in AccessTokenAuthenticator::unserialize() to restore OAuth token state from cache or storage, with allowed_classes => true. An attacker who can control the serialized string (e.g. by overwriting a cached token file or via another injection) can supply a serialized "gadget" object. When unserialize() runs, PHP instantiates that object and runs its magic methods (__wakeup, __destruct, etc.), leading to object injection. In environments with common dependencies (e.g. Monolog), this can be chained to remote code execution (RCE). The fix in version 4.0.0 removes PHP serialization from the AccessTokenAuthenticator class requiring users to store and resolve the authenticator manually.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
CVSS Score: 8.1

Product Status

Vendor saloonphp
Product saloon
Versions
  • Version < 4.0.0 is affected

References

Problem Types

  • CWE-502: Deserialization of Untrusted Data CWE