VYPR
Critical severityNVD Advisory· Published Jul 1, 2020· Updated Aug 4, 2024

CVE-2020-13619

CVE-2020-13619

Description

php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2020-13619: Locutus PHP's escapeshellarg function through v2.0.11 fails to sanitize single quotes, allowing command injection and remote code execution.

Overview

CVE-2020-13619 is a command injection vulnerability in the php/exec/escapeshellarg function of the Locutus library (versions up to 2.0.11). Locutus provides TypeScript implementations of PHP standard library functions, including shell argument escaping. The root cause is insufficient sanitization of single quotes, allowing an attacker to break out of the intended argument boundary and inject arbitrary shell commands.

Exploitation

The vulnerability is exploited by passing a crafted string containing two consecutive single characters ('') to the escapeshellarg function. Due to the flawed escaping logic, these characters are not properly handled, enabling an attacker to close the escaping context and append malicious shell commands. No authentication is required if the vulnerable function is exposed to user input; the attacker simply needs to supply the crafted input to an application that uses Locutus escapeshellarg to sanitize shell arguments [1][2].

Impact

Successful exploitation allows an attacker to achieve arbitrary code execution on the server or client environment where the vulnerable function is invoked. This can lead to full system compromise, data exfiltration, or further lateral movement, depending on the privileges of the running process [2][3].

Mitigation

The vendor was contacted on May 27, 2020, but after 30 days with no response, the issue was publicly disclosed on July 1, 2020 [3]. A proof-of-concept is available. Users should verify if their application uses the affected function and either patch to a fixed version (if available from the vendor) or implement additional input validation. This vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog at the time of this writing.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
locutusnpm
<= 2.0.11

Affected products

2
  • Locutus PHP/Locutus PHPdescription
  • ghsa-coords
    Range: <= 2.0.11

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.