Saloon is a PHP library that gives users tools to build API integrations and SDKs. Versions prior to 4.0.0 used PHP's unserialize() in AccessTokenAuthenticator::unserialize() to restore OAuth token state from cache or storage, with allowed_classes => true. An attacker who can control the serialized string (e.g. by overwriting a cached token file or via another injection) can supply a serialized "gadget" object. When unserialize() runs, PHP instantiates that object and runs its magic methods (__wakeup, __destruct, etc.), leading to object injection. In environments with common dependencies (e.g. Monolog), this can be chained to remote code execution (RCE). The fix in version 4.0.0 removes PHP serialization from the AccessTokenAuthenticator class requiring users to store and resolve the authenticator manually.
References
| Link | Resource |
|---|---|
| https://docs.saloon.dev/upgrade/upgrading-from-v3-to-v4 | Release Notes |
| https://github.com/saloonphp/saloon/security/advisories/GHSA-rf88-776r-rcq9 | Vendor Advisory |
Configurations
History
26 Mar 2026, 20:42
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://docs.saloon.dev/upgrade/upgrading-from-v3-to-v4 - Release Notes | |
| References | () https://github.com/saloonphp/saloon/security/advisories/GHSA-rf88-776r-rcq9 - Vendor Advisory | |
| First Time |
Saloon saloon
Saloon |
|
| CPE | cpe:2.3:a:saloon:saloon:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
26 Mar 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 01:16
Updated : 2026-03-26 20:42
NVD link : CVE-2026-33942
Mitre link : CVE-2026-33942
CVE.ORG link : CVE-2026-33942
JSON object : View
Products Affected
saloon
- saloon
CWE
CWE-502
Deserialization of Untrusted Data
