Voyager PHP Package Vulnerabilities Open Path to One-Click RCE Exploits

January 30, 2025

Voyager, a renowned open-source PHP package designed to manage Laravel applications, has been found to contain multiple vulnerabilities, according to researchers at SonarSource. The package, which provides an administrative interface, BREAD operations, and media and user management, was found to have an arbitrary file write vulnerability during a routine scan by the researchers.

This vulnerability, along with others discovered, could be chained together to enable a one-click remote code execution (RCE) on a Voyager instance. One of the key vulnerabilities allows an attacker to exploit Voyager’s media upload feature. This flaw bypasses MIME type verification, enabling the execution of harmful PHP code through a polyglot file. When combined with the CVE-2024-55416 flaw, this could lead to a serious threat, initiated by a victim clicking on a malicious link.

In a statement by SonarSource, it was noted, “When an authenticated Voyager user clicks on a malicious link, attackers can execute arbitrary code on the server. At the time of writing this blog (Voyager version 1.8.0), the vulnerabilities have not been fixed and we release this information to allow users to protect themselves under our 90-day responsible disclosure deadline.”

Another discovered vulnerability, CVE-2024-55415, allows an attacker to discreetly steal or delete files without needing to drop a harmful PHP file. This is made possible due to inadequate input validation in the pathToLogFile function. A user could be tricked into clicking a harmful link, leading to arbitrary file deletion, potentially affecting server availability or enabling code execution.

Furthermore, the /admin/compass endpoint allows for file downloads, which, when combined with a previous XSS vulnerability, could be used to extract sensitive data to an attacker-controlled server. Despite multiple attempts to contact the project maintainers via email and GitHub, there has been no response from them. This information is being publicly released under a 90-day responsible disclosure policy to protect users.

SonarSource concluded their report by stating, “At this time, no patches are available to address the vulnerabilities we’ve identified. Despite multiple attempts to contact the project maintainers via email and GitHub, we have not received a response. In accordance with our responsible disclosure policy, we are publicly releasing the details of our findings after 90 days. We believe this allows users of Voyage to make informed decisions about their use of Voyage. We strongly advise users to carefully consider using this project in their applications and exercise caution when deciding to do so.”

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.