Packistry is a self-hosted Composer repository designed to handle PHP package distribution. Prior to version 0.13.0, RepositoryAwareController::authorize() verified token presence and ability, but did not enforce token expiration. As a result, an expired deploy token with the correct ability could still access repository endpoints (e.g., Composer metadata/download APIs). The fix in version 0.13.0 adds an explicit expiration check, and tests now test expired deploy tokens to ensure they are rejected.
References
| Link | Resource |
|---|---|
| https://github.com/packistry/packistry/commit/7740b48f0f4ecbe63099fb056c8a146180f8b283 | Patch |
| https://github.com/packistry/packistry/pull/276 | Issue Tracking Patch |
| https://github.com/packistry/packistry/security/advisories/GHSA-4r9m-jp53-vgmw | Patch Vendor Advisory |
Configurations
History
02 Mar 2026, 18:04
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:packistryphp:packistry:*:*:*:*:*:*:*:* | |
| First Time |
Packistryphp
Packistryphp packistry |
|
| References | () https://github.com/packistry/packistry/commit/7740b48f0f4ecbe63099fb056c8a146180f8b283 - Patch | |
| References | () https://github.com/packistry/packistry/pull/276 - Issue Tracking, Patch | |
| References | () https://github.com/packistry/packistry/security/advisories/GHSA-4r9m-jp53-vgmw - Patch, Vendor Advisory |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Feb 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 02:16
Updated : 2026-03-02 18:04
NVD link : CVE-2026-27968
Mitre link : CVE-2026-27968
CVE.ORG link : CVE-2026-27968
JSON object : View
Products Affected
packistryphp
- packistry
