CVE-2026-44262: Critical RCE in Laravel Scramble API Docs
A critical remote code execution (RCE) vulnerability, CVE-2026-44262, has been identified in Scramble, a tool for generating API documentation for Laravel projects. According to the National Vulnerability Database, versions 0.13.2 through to before 0.13.22 are affected. The flaw stems from how Scramble processes user-controlled input within validation rules during documentation generation when endpoints are publicly accessible.
This vulnerability, rated 9.4 CRITICAL on the CVSS scale, allows for the execution of arbitrary PHP code within the application’s context. The National Vulnerability Database highlights that the core issue lies in the evaluation of request-supplied data, which attackers can manipulate to inject and run malicious code. This is a severe oversight, especially given the ease of exploitation with no authentication required.
Defenders need to understand the attacker’s calculus here: publicly exposed API documentation endpoints are low-hanging fruit. If an attacker can simply send crafted input to trigger RCE, it’s game over. The fix, available in Scramble version 0.13.22, directly addresses this code execution vector. Patching is not optional; it’s an immediate imperative for any organization running vulnerable versions.
What This Means For You
- If your organization uses Laravel Scramble for API documentation, immediately verify your version. If it's between 0.13.2 and before 0.13.22, you are vulnerable to CVE-2026-44262. Update to version 0.13.22 or newer without delay. Furthermore, review if your API documentation endpoints are publicly accessible and, if so, reassess that exposure.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-44262: Laravel Scramble API Docs RCE via Documentation Endpoint
title: CVE-2026-44262: Laravel Scramble API Docs RCE via Documentation Endpoint
id: scw-2026-05-12-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-44262 by accessing Laravel Scramble API documentation endpoints with specific query parameters that could trigger the RCE vulnerability. This targets the initial access vector where unauthenticated users can trigger code execution by manipulating documentation generation requests.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44262/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/documentation'
cs-uri-query|contains:
- 'response_type='
- 'request_type='
cs-method|exact:
- 'GET'
sc-status|exact:
- '200'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44262 | RCE | Scramble API documentation generator for Laravel versions 0.13.2 to before 0.13.22 |
| CVE-2026-44262 | RCE | Publicly accessible documentation endpoints in Scramble |
| CVE-2026-44262 | RCE | Validation rules referencing user-controlled input during documentation generation in Scramble |
| CVE-2026-44262 | RCE | Arbitrary PHP code execution via request supplied data evaluation in Scramble |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 13, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.