Description
Snuffleupagus is a module that raises the cost of attacks against website by killing bug classes and providing a virtual patching system. On deployments of Snuffleupagus prior to version 0.13.0 with the non-default upload validation feature enabled and configured to use one of the upstream validation scripts based on Vulcan Logic Disassembler (VLD) while the VLD extension is not available to the CLI SAPI, all files from multipart POST requests are evaluated as PHP code. The issue was fixed in version 0.13.0.
Published: 2026-01-08
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Snuffleupagus allows attackers to execute any PHP code that is uploaded through multipart POST requests when the non‑default upload validation feature is enabled and configured to use a Vulcan Logic Disassembler script, but the VLD extension is missing from the CLI SAPI. The flaw arises from a flaw in input validation (CWE‑636), causing every uploaded file to be evaluated as PHP code. This means an adversary can inject malicious PHP that the web application will execute, compromising confidentiality, integrity, and availability of the affected system.

Affected Systems

The affected product is Snuffleupagus from jvoisin. Versions prior to 0.13.0 with upload validation enabled and configured to use VLD‑based scripts while the VLD extension is not available to the CLI SAPI are vulnerable. The vulnerability does not affect later releases of Snuffleupagus.

Risk and Exploitability

The CVSS score of 9.2 indicates a high severity. The EPSS score is less than 1%, suggesting a low probability of exploitation at the time of analysis, and the vulnerability is not listed in the CISA KEV catalog. Attackers would typically use a HTTP POST request with a multipart/form‑data payload to upload a file containing PHP code; if the module interprets the file as code, it will run with the PHP process’s privileges. The issue has been fixed in version 0.13.0, so only legacy installations remain at risk.

Generated by OpenCVE AI on April 18, 2026 at 07:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Snuffleupagus to version 0.13.0 or newer.
  • If an immediate upgrade is not possible, disable the non‑default upload validation feature or switch to a validation script that does not rely on the VLD extension.
  • If the VLD extension must be used, ensure it is available to the CLI SAPI before enabling upload validation.

Generated by OpenCVE AI on April 18, 2026 at 07:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Jvoisin
Jvoisin snuffleupagus
CPEs cpe:2.3:a:jvoisin:snuffleupagus:*:*:*:*:*:*:*:*
Vendors & Products Jvoisin
Jvoisin snuffleupagus
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 15:00:00 +0000

Type Values Removed Values Added
Description Snuffleupagus is a module that raises the cost of attacks against website by killing bug classes and providing a virtual patching system. On deployments of Snuffleupagus prior to version 0.13.0 with the non-default upload validation feature enabled and configured to use one of the upstream validation scripts based on Vulcan Logic Disassembler (VLD) while the VLD extension is not available to the CLI SAPI, all files from multipart POST requests are evaluated as PHP code. The issue was fixed in version 0.13.0.
Title Snuffleupagus vulnerable to RCE on instances with upload validation enabled but without the VLD package
Weaknesses CWE-636
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Jvoisin Snuffleupagus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-08T15:06:42.132Z

Reserved: 2026-01-05T22:30:38.719Z

Link: CVE-2026-22034

cve-icon Vulnrichment

Updated: 2026-01-08T15:06:08.840Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T15:15:45.150

Modified: 2026-03-09T14:04:29.357

Link: CVE-2026-22034

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:45:24Z

Weaknesses