CVE-2020-13619
Description
php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2020-13619: Locutus PHP's escapeshellarg function through v2.0.11 fails to sanitize single quotes, allowing command injection and remote code execution.
Overview
CVE-2020-13619 is a command injection vulnerability in the php/exec/escapeshellarg function of the Locutus library (versions up to 2.0.11). Locutus provides TypeScript implementations of PHP standard library functions, including shell argument escaping. The root cause is insufficient sanitization of single quotes, allowing an attacker to break out of the intended argument boundary and inject arbitrary shell commands.
Exploitation
The vulnerability is exploited by passing a crafted string containing two consecutive single characters ('') to the escapeshellarg function. Due to the flawed escaping logic, these characters are not properly handled, enabling an attacker to close the escaping context and append malicious shell commands. No authentication is required if the vulnerable function is exposed to user input; the attacker simply needs to supply the crafted input to an application that uses Locutus escapeshellarg to sanitize shell arguments [1][2].
Impact
Successful exploitation allows an attacker to achieve arbitrary code execution on the server or client environment where the vulnerable function is invoked. This can lead to full system compromise, data exfiltration, or further lateral movement, depending on the privileges of the running process [2][3].
Mitigation
The vendor was contacted on May 27, 2020, but after 30 days with no response, the issue was publicly disclosed on July 1, 2020 [3]. A proof-of-concept is available. Users should verify if their application uses the affected function and either patch to a fixed version (if available from the vendor) or implement additional input validation. This vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog at the time of this writing.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
locutusnpm | <= 2.0.11 | — |
Affected products
2- Locutus PHP/Locutus PHPdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-h86x-mv66-gr5qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-13619ghsaADVISORY
- locutus.io/phpghsaWEB
- locutus.io/php/mitrex_refsource_MISC
- reallinkers.github.io/CVE-2020-13619/mitrex_refsource_MISC
- web.archive.org/web/20230521185837/https://reallinkers.github.io/CVE-2020-13619ghsaWEB
- www.npmjs.com/package/locutusghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.