Home

Description

Flight is an extensible micro-framework for PHP. Prior to 3.18.1, Request::getMethod() unconditionally honors the X-HTTP-Method-Override header and the $_REQUEST['_method'] parameter on any HTTP verb (including safe verbs such as GET), with no opt-in and no whitelist of permitted target methods. A GET request can silently become a DELETE or PUT, enabling CSRF escalation against destructive endpoints, bypass of middleware gated on unsafe verbs, and cache poisoning between CDN and origin. This vulnerability is fixed in 3.18.1.

PUBLISHED Reserved 2026-04-28 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-436: Interpretation Conflict

Product status

< 3.18.1
affected

References

github.com/...p/core/security/advisories/GHSA-vxrr-w42w-w76g exploit

github.com/...p/core/security/advisories/GHSA-vxrr-w42w-w76g

cve.org (CVE-2026-42551)

nvd.nist.gov (CVE-2026-42551)

Download JSON