CVE-2024-52301
HIGH EXPLOITEDLaravel - Info Disclosure
Title source: llmDescription
Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs.
Exploits (3)
nomisec
WORKING POC
4 stars
by martinhaunschmid · infoleak
https://github.com/martinhaunschmid/CVE-2024-52301-Research
Scores
CVSS v3
7.5
EPSS
0.6571
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Exploitation Intel
VulnCheck KEV
2025-06-08
Classification
CWE
CWE-88
Status
published
Affected Products (3)
laravel/framework
< 6.20.45
debian/debian_linux
laravel/framework
< 6.20.45Packagist
Timeline
Published
Nov 12, 2024
Tracked Since
Feb 18, 2026