Description
Scramble generates API documentation for Laravel project. From 0.13.2 to before 0.13.22, when documentation endpoints are publicly accessible and validation rules reference user-controlled input, request supplied data may be evaluated during documentation generation, leading to execution of arbitrary PHP code in the application context. This vulnerability is fixed in 0.13.22.
Published: 2026-05-12
Score: 9.4 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Scramble tool generates API documentation for Laravel projects. From version 0.13.2 up to but not including 0.13.22, if the public documentation endpoints are accessed and validation rules reference user‑controlled input, the data supplied in the request may be evaluated as PHP code during documentation generation. This means that an attacker can cause arbitrary PHP code to execute in the application context, a classic code execution flaw identified as CWE‑94. The impact is the loss of all application confidentiality, integrity, and availability for affected deployments.

Affected Systems

The affected product is the Scramble library from dedoc, used to produce OpenAPI documentation for Laravel applications. All releases between 0.13.2 and 0.13.21, inclusive, are vulnerable. The vulnerability is triggered only when the documentation endpoints are exposed to the outside world; if the service is isolated, the threat is mitigated.

Risk and Exploitability

The CVSS score of 9.4 indicates a critical severity. Because EPSS data is not available, the statistical likelihood of exploitation is unknown, but the design flaw suggests a high exploitation probability. The vulnerability is not listed in the CISA KEV catalog, yet the remote code execution potential warrants immediate attention. An attacker would exploit the flaw by sending a crafted request to the public documentation endpoint, causing user input referenced in validation rules to be evaluated as PHP code. The absence of an official workaround means the only practical defense is to patch or mitigate the conditions that enable the exploit.

Generated by OpenCVE AI on May 12, 2026 at 22:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Scramble to version 0.13.22 or later.
  • If upgrading is not immediately possible, temporarily disable public access to documentation endpoints during use of older versions.
  • Remove or neutralize any user‑controlled references from validation rules that are evaluated during documentation generation.

Generated by OpenCVE AI on May 12, 2026 at 22:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4rm2-28vj-fj39 Scramble vulnerable to remote code execution via evaluation of user-controlled input in validation rules
History

Tue, 12 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description Scramble generates API documentation for Laravel project. From 0.13.2 to before 0.13.22, when documentation endpoints are publicly accessible and validation rules reference user-controlled input, request supplied data may be evaluated during documentation generation, leading to execution of arbitrary PHP code in the application context. This vulnerability is fixed in 0.13.22.
Title Scramble: Remote code execution via evaluation of user-controlled input in validation rules
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T20:56:01.046Z

Reserved: 2026-05-05T16:33:55.844Z

Link: CVE-2026-44262

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T22:16:36.563

Modified: 2026-05-12T22:16:36.563

Link: CVE-2026-44262

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T23:00:12Z

Weaknesses