CVE-2026-25129: PsySH has Local Privilege Escalation via CWD .psysh.php auto-load
(updated )
PsySH automatically loads and executes a .psysh.php file from the Current Working Directory (CWD) on startup. If an attacker can write to a directory that a victim later uses as their CWD when launching PsySH, the attacker can trigger arbitrary code execution in the victim’s context. When the victim runs PsySH with elevated privileges (e.g., root), this results in local privilege escalation.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-25129 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →