Impact
The vulnerability in Pimcore allows the http_error_log file to store the contents of the $_COOKIE and $_SERVER superglobals. These variables can contain sensitive credentials such as database passwords, session tokens, and other confidential data. Exposing them in the error log means that anyone who can read the log file can recover these secrets, effectively compromising both confidentiality and integrity of the application’s environment and user data.
Affected Systems
Pimcore data and experience management platform versions prior to 12.3.1 and 11.5.14 are affected. The issue was addressed in the releases 12.3.1 and 11.5.14 and later. All installations using earlier Pimcore releases should be upgraded to at least the corrected versions.
Risk and Exploitability
The CVSS score of 8.6 classifies this as a high severity vulnerability, while the EPSS score of less than 1% suggests a very low probability of exploitation. The vulnerability is not currently listed in the CISA KEV catalog. Based on the description, it is inferred that exploiting the flaw requires an ability to read the http_error_log file, which typically involves elevated privileges on the host or access to the Pimcore backend. An attacker with such access could retrieve environmental and session information, potentially leading to full system compromise.
OpenCVE Enrichment
Github GHSA