Scramble Remote Code Execution via User-Controlled Input
Scramble versions 0.13.2 through 0.13.21 are vulnerable to remote code execution due to the evaluation of user-controlled input in validation rules during documentation generation, potentially allowing attackers to execute arbitrary PHP code.
A remote code execution vulnerability, identified as CVE-2026-44262, affects Scramble versions 0.13.2 up to 0.13.21. This flaw stems from the evaluation of user-controlled input within validation rules when documentation endpoints are publicly accessible. Specifically, during the generation of API documentation, request supplied data that is referenced in the validation rules can be evaluated, resulting in the execution of arbitrary PHP code within the application’s context. This vulnerability allows unauthenticated attackers to potentially gain full control of the affected system. The issue has been addressed in Scramble version 0.13.22. Defenders should prioritize patching to mitigate the risk of exploitation.
Attack Chain
- An attacker identifies a Scramble application running a vulnerable version (0.13.2 - 0.13.21) with publicly accessible documentation endpoints, such as
/docs/apior/docs/api.json. - The attacker analyzes the application’s validation rules to identify endpoints that utilize user-controlled input (e.g., request parameters) within validation expressions.
- The attacker crafts a malicious HTTP request containing a payload designed to inject PHP code into the validation rule’s expression.
- The crafted request is sent to an endpoint that triggers the vulnerable validation rule.
- During the documentation generation process, Scramble evaluates the malicious input, leading to the execution of the injected PHP code.
- The attacker’s PHP code executes within the application’s context, potentially allowing them to read sensitive files, execute system commands, or establish a reverse shell.
- The attacker leverages the gained access to move laterally within the network, escalate privileges, or exfiltrate sensitive data.
- The attacker achieves their final objective, such as data theft, system compromise, or denial of service.
Impact
Successful exploitation of this vulnerability allows an attacker to execute arbitrary PHP code on the affected server. This can lead to complete system compromise, including data theft, modification, or destruction. Given the nature of RCE vulnerabilities, the impact is considered critical. The number of affected systems depends on the prevalence of Scramble within publicly accessible environments, but any unpatched instance is at risk.
Recommendation
- Upgrade Scramble to version 0.13.22 or later to patch CVE-2026-44262.
- Restrict access to documentation endpoints (
/docs/api,/docs/api.json) to trusted networks or users as a workaround if patching is not immediately feasible. - Review and eliminate the use of user-controlled variables inside validation rule expressions, as suggested in the advisory.
- Implement a web application firewall (WAF) rule to detect and block requests containing potentially malicious PHP code in request parameters.
Detection coverage 3
Detect Access to Scramble Documentation Endpoints
lowDetects access to the Scramble documentation endpoints, which may indicate reconnaissance or exploitation attempts.
Detect PHP Code Injection Attempts in URI Query
highDetects attempts to inject PHP code in the URI query string, potentially targeting the Scramble vulnerability.
Detect PHP Code Injection Attempts in URI Stem
highDetects attempts to inject PHP code in the URI stem, potentially targeting the Scramble vulnerability.
Detection queries are kept inside the platform. Get full rules →