Fix League OAuth2 Server — CVE-2023-48231 HIGH
Fix CVE-2023-48231 (HIGH) in League OAuth2 Server for PHP. Paste your composer.json into PackageFix and get a patched version — no CLI, no signup. Token leakage via access token introspection endpoint.
⚠ Vulnerability
CVE-2023-48231 (HIGH) — token leakage via access token introspection endpoint in League OAuth2 Server below ^9.0.
Vulnerable — composer.json
"league/oauth2-server": "^8.3"
Fixed — composer.json
"league/oauth2-server": "^9.0"
✓ Fix
Update League OAuth2 Server to ^9.0 and run composer install.
Paste your manifest — get back a fixed version with all CVEs patched in seconds.
Open PackageFix →No signup · No CLI · No GitHub connection · Runs 100% in your browser
CVE Details
| Field | Value |
|---|---|
| CVE ID | CVE-2023-48231 |
| Severity | HIGH |
| Package | League OAuth2 Server (PHP) |
| Safe version | ^9.0 |
| CISA KEV | — |
| Description | Token leakage via access token introspection endpoint |
Frequently Asked Questions
What is CVE-2023-48231?
CVE-2023-48231 is a HIGH severity vulnerability in League OAuth2 Server (PHP) that allows token leakage via access token introspection endpoint. Update to ^9.0 or later.
How do I fix CVE-2023-48231 in League OAuth2 Server?
Update League OAuth2 Server to version ^9.0 in your composer.json and run composer install.
Is CVE-2023-48231 being actively exploited?
Check packagefix.dev — the CISA KEV catalog updates daily.
How do I verify the fix for CVE-2023-48231?
After updating, paste your composer.json into PackageFix again. If CVE-2023-48231 no longer appears in the CVE table, the fix is applied.