Gibbon through 26.0.00 allows remote authenticated users to conduct PHP deserialization attacks via columnOrder in a POST request to the modules/System%20Admin/import_run.php&type=externalAssessment&step=4 URI.
References
| Link | Resource |
|---|---|
| https://gibbonedu.org/download/ | Product |
| https://www.exploit-db.com/exploits/51903 | Exploit |
| https://gibbonedu.org/download/ | Product |
| https://www.exploit-db.com/exploits/51903 | Exploit |
Configurations
History
29 Jul 2025, 20:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gibbonedu.org/download/ - Product | |
| References | () https://www.exploit-db.com/exploits/51903 - Exploit | |
| CPE | cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:* | |
| First Time |
Gibbonedu gibbon
Gibbonedu |
Information
Published : 2024-03-23 23:15
Updated : 2025-07-29 20:05
NVD link : CVE-2024-24725
Mitre link : CVE-2024-24725
CVE.ORG link : CVE-2024-24725
JSON object : View
Products Affected
gibbonedu
- gibbon
CWE
CWE-502
Deserialization of Untrusted Data
