Flight is an extensible micro-framework for PHP. Prior to 3.18.1, Request::getMethod() unconditionally honors the X-HTTP-Method-Override header and the $_REQUEST['_method'] parameter on any HTTP verb (including safe verbs such as GET), with no opt-in and no whitelist of permitted target methods. A GET request can silently become a DELETE or PUT, enabling CSRF escalation against destructive endpoints, bypass of middleware gated on unsafe verbs, and cache poisoning between CDN and origin. This vulnerability is fixed in 3.18.1.

Project Subscriptions

Vendors Products
Flightphp Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vxrr-w42w-w76g Flight: HTTP method override enabled by default, facilitating CSRF escalation and middleware bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 14 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Flightphp
Flightphp core
Vendors & Products Flightphp
Flightphp core

Thu, 14 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description Flight is an extensible micro-framework for PHP. Prior to 3.18.1, Request::getMethod() unconditionally honors the X-HTTP-Method-Override header and the $_REQUEST['_method'] parameter on any HTTP verb (including safe verbs such as GET), with no opt-in and no whitelist of permitted target methods. A GET request can silently become a DELETE or PUT, enabling CSRF escalation against destructive endpoints, bypass of middleware gated on unsafe verbs, and cache poisoning between CDN and origin. This vulnerability is fixed in 3.18.1.
Title Flight: HTTP method override enabled by default enables CSRF escalation and middleware bypass in flightphp/core
Weaknesses CWE-436
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T12:49:48.236Z

Reserved: 2026-04-28T16:56:50.191Z

Link: CVE-2026-42551

cve-icon Vulnrichment

Updated: 2026-05-14T12:48:56.633Z

cve-icon NVD

Status : Received

Published: 2026-05-13T20:16:22.190

Modified: 2026-05-14T13:16:18.573

Link: CVE-2026-42551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T14:33:38Z

Weaknesses