PHP Web programming language
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any PHP product.
RSS Feeds for PHP security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in PHP products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by PHP Sorted by Most Security Vulnerabilities since 2018
Recent PHP Security Advisories
| Advisory | Title | Published |
|---|---|---|
| 8.5.6 | 11 Vulnerabilities Fixed in PHP 8.5.6 | May 7, 2026 |
| 8.2.31 | 8 Vulnerabilities Fixed in PHP 8.2.31 | May 7, 2026 |
| 8.3.31 | 8 Vulnerabilities Fixed in PHP 8.3.31 | May 7, 2026 |
| 8.4.21 | 10 Vulnerabilities Fixed in PHP 8.4.21 | May 7, 2026 |
| 8.1.34 | 3 Vulnerabilities Fixed in PHP 8.1.34 | December 19, 2025 |
| 8.4.16 | 3 Vulnerabilities Fixed in PHP 8.4.16 | December 19, 2025 |
| 8.2.30 | 3 Vulnerabilities Fixed in PHP 8.2.30 | December 18, 2025 |
| 8.5.1 | 3 Vulnerabilities Fixed in PHP 8.5.1 | December 18, 2025 |
| 8.3.29 | 3 Vulnerabilities Fixed in PHP 8.3.29 | December 18, 2025 |
| 8.1.33 | 3 Vulnerabilities Fixed in PHP 8.1.33 | July 3, 2025 |
Known Exploited PHP Vulnerabilities
The following PHP vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| PHPMailer Command Injection Vulnerability |
PHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition. CVE-2016-10033 Exploit Probability: 94.5% |
July 7, 2025 |
| PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability |
In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution. CVE-2019-11043 Exploit Probability: 94.1% |
March 25, 2022 |
| PHP-CGI Query String Parameter Vulnerability |
sapi/cgi/cgi_main.c in PHP, when configured as a CGI script, does not properly handle query strings, which allows remote attackers to execute arbitrary code. CVE-2012-1823 Exploit Probability: 94.4% |
March 25, 2022 |
Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 11 vulnerabilities in PHP with an average score of 5.1 out of ten. Last year, in 2025 PHP had 15 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in PHP in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.12.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 11 | 5.10 |
| 2025 | 15 | 4.98 |
| 2024 | 18 | 7.03 |
| 2023 | 7 | 7.09 |
| 2022 | 12 | 8.66 |
| 2021 | 8 | 6.36 |
| 2020 | 17 | 6.34 |
| 2019 | 31 | 7.75 |
| 2018 | 22 | 7.51 |
It may take a day or so for new PHP vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent PHP Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-7263 | May 10, 2026 |
PHP 8.4/8.5 (before 8.4.21/8.5.6) DOMNode::C14N() DoS via infinite loopIn PHP versions 8.4.* before 8.4.21 and 8.5.* before 8.5.6, DOMNode::C14N() method may process the XML data incorrectly, causing a circular linked list in the data structure representing the XML document. This may cause subsequent processing of the XML document to enter infinite loop, causing denial of service in the processing application. |
|
| CVE-2026-6104 | May 10, 2026 |
PHP 8.4/8.5 mbstring NUL-byte Encoding OOB Read (fixed 8.4.21/8.5.6)In PHP versions 8.4.* before 8.4.21 and 8.5.* before 8.5.6, when an encoding name containing an embedded NUL byte is passed to mb_convert_encoding() or related mbstring functions, the code incorrectly assumes that when strncasecmp() returns 0 it means the strings have the same length. This can lead to out-of-bounds read of global memory, potentially causing a crash or information disclosure or crash. Affected functions include mb_convert_encoding(), mb_detect_encoding(), mb_convert_variables(), and mb_detect_order(), as well as the mbstring.detect_order and mbstring.http_output INI settings. |
|
| CVE-2026-7258 | May 10, 2026 |
PHP 8.2-8.5: signed char to ctype triggers DoS in urldecodeIn PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, some functions, including urldecode(), pass signed char to ctype functions (like isxdigit()). On the systems with default signed char and optimized table-lookup ctype functions - such as NetBSD - this can lead to accessing array with negative offset, which can trigger a denial of service. |
|
| CVE-2026-6722 | May 10, 2026 |
PHP 8.28.5 SOAP UAF RCE via dangling pointerIn PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP object while its stale pointer remains in the map. A subsequent href reference to the freed node can copy the dangling pointer into the result. As PHP string allocations can reclaim the freed memory region, an attacker with control over the SOAP request body can exploit this use-after-free to achieve remote code execution. |
|
| CVE-2026-7259 | May 10, 2026 |
Segfault DoS: PHP 8.28.5 via mb_regex_encoding NULL ptr derefIn PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, a mismatch between encoding lists in Oniguruma and mbfl leads to a NULL pointer dereference, resulting in a segmentation fault and denial of service. The vulnerability is exploitable when user-controlled input can influence the encoding passed to mb_regex_encoding(). |
|
| CVE-2026-7261 | May 10, 2026 |
PHP 8.28.5 UAFREE in SoapServer before 8.2.31/8.3.31/8.4.21/8.5.6In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system. |
|
| CVE-2026-7262 | May 10, 2026 |
PHP SOAP Typemap Null Deref Crash (8.2-8.5 pre 8.2.31/8.3.31/8.4.21/8.5.6)In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when a SOAP server has a typemap configured, the decoding process contains a mistake which checks the wrong variable in case of missing value element. This leads to dereferences a NULL pointer, causing a segmentation fault. This allows a remote unauthenticated attacker to crash the PHP SOAP server process, resulting in denial of service. |
|
| CVE-2025-14179 | May 10, 2026 |
PHP 8.2-8.5 PDO Firebird SQLi via NUL Byte InjectionIn PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the PDO Firebird driver improperly handles NUL bytes when preparing SQL queries. During token-by-token query construction, a string token containing a NUL byte is copied via strncat(), which stops at the NUL byte, dropping the closing quote and causing subsequent SQL tokens to be interpreted as part of the string. This allows SQL injection when attacker-controlled values are quoted via PDO::quote() and embedded in SQL statements. |
|
| CVE-2026-7568 | May 10, 2026 |
DoS via int overflow PHP 8.x metaphone() (before 8.2.31/8.3.31/8.4.21/8.5.6)In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process. |
|
| CVE-2026-6735 | May 10, 2026 |
XSS via PHP-FPM Status Page (PHP < 8.5.6, 8.4.21, 8.3.31, 8.2.31)In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, 8.5.* before 8.5.6, due to improper sanitation of user data, it allows an attacker to compose an URL, which will cause the target to execute arbitrary JavaScript code (XSS) on the target's machine when the target is viewing the PHP-FPM status page. |
|
| CVE-2026-42371 | Apr 27, 2026 |
uriparser <1.0.1 numeric truncation in URI text range (gigabyte length)uriparser before 1.0.1 has numeric truncation in text range comparison, if an application accepts URIs with a length in gigabytes. |
|
| CVE-2025-14177 | Dec 27, 2025 |
PHP 8.x getimagesize() Info Disclosure in APPn Segments (before 8.4.16)In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server. |
|
| CVE-2025-14178 | Dec 27, 2025 |
Heap Buffer Overflow IN PHP array_merge (8.18.5) pre 8.5.1In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server. |
|
| CVE-2025-14180 | Dec 27, 2025 |
PHP 8.x PDO PgSQL Emulate Prepares Null Deref Crash (CVE-2025-14180)In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server. |
|
| CVE-2025-67899 | Dec 14, 2025 |
Uriparser <=0.9.9 Recursion Stack overflowuriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas. |
|
| CVE-2025-1220 | Jul 13, 2025 |
PHP 8.x fsockopen Null Char Validation Flaw <8.1.33/8.2.29/8.3.23/8.4.10In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions. |
|
| CVE-2025-1735 | Jul 13, 2025 |
PHP Prior 8.4.29: pgsql/PDO_PGSQL Escaping Ignores Quoting ErrorsIn PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This could cause crashes if Postgres server rejects the string as invalid. |
|
| CVE-2025-6491 | Jul 13, 2025 |
PHP<8.x: NPD via XML NS Prefix in SOAPIn PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 when parsing XML data in SOAP extensions, overly large (>2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server. |
|
| CVE-2025-7381 | Jul 09, 2025 |
CVE-2025-7381: PHP X-Powered-By Header Exposes PHP VersionImpactThis is an information disclosure vulnerability originating from PHP's base image. This vulnerability exposes the PHP version through an X-Powered-By header, which attackers could exploit to fingerprint the server and identify potential weaknesses. WorkaroundsThe mitigation requires changing the expose_php variable from "On" to "Off" in the file located at /usr/local/etc/php/php.ini. |
|
| CVE-2024-11235 | Apr 04, 2025 |
UAF in PHP 8.3/8.4 via __set / ??= OperatorIn PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??= operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution. |
|
| CVE-2025-1734 | Mar 30, 2025 |
PHP <8.1.32/8.2.28/8.3.19/8.4.5: Invalid Headers Treated as ValidIn PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers. |
|
| CVE-2025-1861 | Mar 30, 2025 |
PHP 8.1-8.4 Lim. on HTTP Redirect Location Buffer (CVE-2025-1861)In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location. |
|
| CVE-2025-1736 | Mar 30, 2025 |
PHP Header Injection via Insufficient EOL Validation (<=8.1.32, <=8.2.28, <=8.3.19, <=8.4.5)In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted. |
|
| CVE-2025-1219 | Mar 30, 2025 |
PHP 8.1-8.4 DOM/SimpleXML Charset Header Bypass on RedirectIn PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations. |
|
| CVE-2025-1217 | Mar 29, 2025 |
PHP 8.x: Incorrect HTTP Response Header Parsing (v<8.1.32/8.2.28/8.3.19/8.4.5)In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc. |
|
| CVE-2022-31631 | Feb 12, 2025 |
PHP PDO::quote() SQLi in SQLite with too long strings (8.2.2)In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities. |
|
| CVE-2024-11233 | Nov 24, 2024 |
PHP convert.quoted-printable-decode Filter Buffer Overread VulnerabilityIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas. |
|
| CVE-2024-11236 | Nov 24, 2024 |
PHP ldap_escape() Integer Overflow Vulnerability on 32-bit SystemsIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write. |
|
| CVE-2024-11234 | Nov 24, 2024 |
PHP Stream Proxy Request Smuggling VulnerabilityIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user. |
|
| CVE-2024-8929 | Nov 22, 2024 |
PHP MySQL Client Heap Disclosure VulnerabilityIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server. |
|
| CVE-2024-8932 | Nov 22, 2024 |
PHP ldap_escape() Integer Overflow Vulnerability on 32-bit SystemsIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write. |
|
| CVE-2024-8927 | Oct 08, 2024 |
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirectIn PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP. |
|
| CVE-2024-8926 | Oct 08, 2024 |
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-8925 | Oct 08, 2024 |
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior. |
|
| CVE-2024-9026 | Oct 08, 2024 |
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability. |
|
| CVE-2024-8925 | Oct 08, 2024 |
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior. |
|
| CVE-2024-8926 | Oct 08, 2024 |
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-8927 | Oct 08, 2024 |
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirectIn PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP. |
|
| CVE-2024-9026 | Oct 08, 2024 |
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability. |
|
| CVE-2024-8925 | Oct 08, 2024 |
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior. |
|
| CVE-2024-8926 | Oct 08, 2024 |
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-8927 | Oct 08, 2024 |
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirectIn PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP. |
|
| CVE-2024-9026 | Oct 08, 2024 |
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|