Description
Packistry is a self-hosted Composer repository designed to handle PHP package distribution. Prior to version 0.13.0, RepositoryAwareController::authorize() verified token presence and ability, but did not enforce token expiration. As a result, an expired deploy token with the correct ability could still access repository endpoints (e.g., Composer metadata/download APIs). The fix in version 0.13.0 adds an explicit expiration check, and tests now test expired deploy tokens to ensure they are rejected.
Published: 2026-02-26
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Expired deploy tokens bypass authentication
Action: Apply Patch
AI Analysis

Impact

Packistry allows an attacker to use an expired deploy token to access repository endpoints such as metadata and download APIs because token expiration is not checked. This weakness enables unauthorized read access to artifacts that the token is intended to expose, exposing package contents and potentially facilitating further exploitation if the token has elevated privileges. The vulnerability is classified as an improper authentication failure, represented by CWE-287 and CWE-613.

Affected Systems

The issue is present in all releases of Packistry prior to version 0.13.0. Any installation running an older build that accepts deploy tokens may be affected.

Risk and Exploitability

The CVSS v3 score of 4.3 indicates moderate severity; the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at this time. Packistry is not listed in the CISA KEV catalog. Attackers must obtain or generate an expired deploy token and then send requests to repository endpoints. The attack is feasible over the network and requires only the presence of an expired token, which can be acquired through social engineering, password reuse, or token theft. Once the token is in possession, the attacker can retrieve metadata and download package data without restriction.

Generated by OpenCVE AI on April 17, 2026 at 14:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Packistry to version 0.13.0 or later where expiration checks are enforced.
  • Rotate all existing deploy tokens and issue new ones with proper expiration settings.
  • Validate that token expiration checks are effective by testing access with an intentionally expired token.

Generated by OpenCVE AI on April 17, 2026 at 14:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Packistryphp
Packistryphp packistry
CPEs cpe:2.3:a:packistryphp:packistry:*:*:*:*:*:*:*:*
Vendors & Products Packistryphp
Packistryphp packistry

Thu, 26 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Packistry
Packistry packistry
Vendors & Products Packistry
Packistry packistry

Thu, 26 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description Packistry is a self-hosted Composer repository designed to handle PHP package distribution. Prior to version 0.13.0, RepositoryAwareController::authorize() verified token presence and ability, but did not enforce token expiration. As a result, an expired deploy token with the correct ability could still access repository endpoints (e.g., Composer metadata/download APIs). The fix in version 0.13.0 adds an explicit expiration check, and tests now test expired deploy tokens to ensure they are rejected.
Title Packistry accepts expired access tokens
Weaknesses CWE-287
CWE-613
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Packistry Packistry
Packistryphp Packistry
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T14:53:10.334Z

Reserved: 2026-02-25T03:24:57.793Z

Link: CVE-2026-27968

cve-icon Vulnrichment

Updated: 2026-02-26T14:53:05.300Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-26T02:16:23.990

Modified: 2026-03-02T18:04:44.283

Link: CVE-2026-27968

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:30:20Z

Weaknesses