PHP PHP Web programming language

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any PHP product.

RSS Feeds for PHP security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in PHP products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by PHP Sorted by Most Security Vulnerabilities since 2018

PHP262 vulnerabilities
Web programming language

PHP Archive Tar5 vulnerabilities

PHP Pearweb2 vulnerabilities

PHP Imagick1 vulnerability

PHP Memcached1 vulnerability

PHP Pear Archive Tar1 vulnerability

PHP Xml Rpc1 vulnerability

Recent PHP Security Advisories

Advisory Title Published
8.5.6 11 Vulnerabilities Fixed in PHP 8.5.6 May 7, 2026
8.2.31 8 Vulnerabilities Fixed in PHP 8.2.31 May 7, 2026
8.3.31 8 Vulnerabilities Fixed in PHP 8.3.31 May 7, 2026
8.4.21 10 Vulnerabilities Fixed in PHP 8.4.21 May 7, 2026
8.1.34 3 Vulnerabilities Fixed in PHP 8.1.34 December 19, 2025
8.4.16 3 Vulnerabilities Fixed in PHP 8.4.16 December 19, 2025
8.2.30 3 Vulnerabilities Fixed in PHP 8.2.30 December 18, 2025
8.5.1 3 Vulnerabilities Fixed in PHP 8.5.1 December 18, 2025
8.3.29 3 Vulnerabilities Fixed in PHP 8.3.29 December 18, 2025
8.1.33 3 Vulnerabilities Fixed in PHP 8.1.33 July 3, 2025

Known Exploited PHP Vulnerabilities

The following PHP vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
PHPMailer Command Injection Vulnerability PHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition.
CVE-2016-10033 Exploit Probability: 94.5%
July 7, 2025
PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution.
CVE-2019-11043 Exploit Probability: 94.1%
March 25, 2022
PHP-CGI Query String Parameter Vulnerability sapi/cgi/cgi_main.c in PHP, when configured as a CGI script, does not properly handle query strings, which allows remote attackers to execute arbitrary code.
CVE-2012-1823 Exploit Probability: 94.4%
March 25, 2022

Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.

By the Year

In 2026 there have been 11 vulnerabilities in PHP with an average score of 5.1 out of ten. Last year, in 2025 PHP had 15 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in PHP in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.12.




Year Vulnerabilities Average Score
2026 11 5.10
2025 15 4.98
2024 18 7.03
2023 7 7.09
2022 12 8.66
2021 8 6.36
2020 17 6.34
2019 31 7.75
2018 22 7.51

It may take a day or so for new PHP vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent PHP Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-7263 May 10, 2026
PHP 8.4/8.5 (before 8.4.21/8.5.6) DOMNode::C14N() DoS via infinite loop In PHP versions 8.4.* before 8.4.21 and 8.5.* before 8.5.6, DOMNode::C14N() method may process the XML data incorrectly, causing a circular linked list in the data structure representing the XML document. This may cause subsequent processing of the XML document to enter infinite loop, causing denial of service in the processing application.
PHP
CVE-2026-6104 May 10, 2026
PHP 8.4/8.5 mbstring NUL-byte Encoding OOB Read (fixed 8.4.21/8.5.6) In PHP versions 8.4.* before 8.4.21 and 8.5.* before 8.5.6, when an encoding name containing an embedded NUL byte is passed to mb_convert_encoding() or related mbstring functions, the code incorrectly assumes that when strncasecmp() returns 0 it means the strings have the same length. This can lead to out-of-bounds read of global memory, potentially causing a crash or information disclosure or crash. Affected functions include mb_convert_encoding(), mb_detect_encoding(), mb_convert_variables(), and mb_detect_order(), as well as the mbstring.detect_order and mbstring.http_output INI settings.
PHP
CVE-2026-7258 May 10, 2026
PHP 8.2-8.5: signed char to ctype triggers DoS in urldecode In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, some functions, including urldecode(), pass signed char to ctype functions (like isxdigit()). On the systems with default signed char and optimized table-lookup ctype functions - such as NetBSD - this can lead to accessing array with negative offset, which can trigger a denial of service.
PHP
CVE-2026-6722 May 10, 2026
PHP 8.28.5 SOAP UAF RCE via dangling pointer In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP object while its stale pointer remains in the map. A subsequent href reference to the freed node can copy the dangling pointer into the result. As PHP string allocations can reclaim the freed memory region, an attacker with control over the SOAP request body can exploit this use-after-free to achieve remote code execution.
PHP
CVE-2026-7259 May 10, 2026
Segfault DoS: PHP 8.28.5 via mb_regex_encoding NULL ptr deref In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, a mismatch between encoding lists in Oniguruma and mbfl leads to  a NULL pointer dereference, resulting in a segmentation fault and denial of service. The vulnerability is exploitable when user-controlled input can influence the encoding passed to mb_regex_encoding().
PHP
CVE-2026-7261 May 10, 2026
PHP 8.28.5 UAFREE in SoapServer before 8.2.31/8.3.31/8.4.21/8.5.6 In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.
PHP
CVE-2026-7262 May 10, 2026
PHP SOAP Typemap Null Deref Crash (8.2-8.5 pre 8.2.31/8.3.31/8.4.21/8.5.6) In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when a SOAP server has a typemap configured, the decoding process contains a mistake which checks the wrong variable in case of missing value element.  This leads to dereferences a NULL pointer, causing a segmentation fault. This allows a remote unauthenticated attacker to crash the PHP SOAP server process, resulting in denial of service.
PHP
CVE-2025-14179 May 10, 2026
PHP 8.2-8.5 PDO Firebird SQLi via NUL Byte Injection In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the PDO Firebird driver improperly handles NUL bytes when preparing SQL queries. During token-by-token query construction, a string token containing a NUL byte is copied via strncat(), which stops at the NUL byte, dropping the closing quote and causing subsequent SQL tokens to be interpreted as part of the string. This allows SQL injection when attacker-controlled values are quoted via PDO::quote() and embedded in SQL statements.
PHP
CVE-2026-7568 May 10, 2026
DoS via int overflow PHP 8.x metaphone() (before 8.2.31/8.3.31/8.4.21/8.5.6) In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.
PHP
CVE-2026-6735 May 10, 2026
XSS via PHP-FPM Status Page (PHP < 8.5.6, 8.4.21, 8.3.31, 8.2.31) In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, 8.5.* before 8.5.6, due to improper sanitation of user data, it allows an attacker to compose an URL, which will cause the target to execute arbitrary JavaScript code (XSS) on the target's machine when the target is viewing the PHP-FPM status page.
PHP
CVE-2026-42371 Apr 27, 2026
uriparser <1.0.1 numeric truncation in URI text range (gigabyte length) uriparser before 1.0.1 has numeric truncation in text range comparison, if an application accepts URIs with a length in gigabytes.
PHP
CVE-2025-14177 Dec 27, 2025
PHP 8.x getimagesize() Info Disclosure in APPn Segments (before 8.4.16) In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.
PHP
CVE-2025-14178 Dec 27, 2025
Heap Buffer Overflow IN PHP array_merge (8.18.5) pre 8.5.1 In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.
PHP
CVE-2025-14180 Dec 27, 2025
PHP 8.x PDO PgSQL Emulate Prepares Null Deref Crash (CVE-2025-14180) In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.
PHP
CVE-2025-67899 Dec 14, 2025
Uriparser <=0.9.9 Recursion Stack overflow uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
PHP
CVE-2025-1220 Jul 13, 2025
PHP 8.x fsockopen Null Char Validation Flaw <8.1.33/8.2.29/8.3.23/8.4.10 In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.
PHP
CVE-2025-1735 Jul 13, 2025
PHP Prior 8.4.29: pgsql/PDO_PGSQL Escaping Ignores Quoting Errors In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This could cause crashes if Postgres server rejects the string as invalid.
PHP
CVE-2025-6491 Jul 13, 2025
PHP<8.x: NPD via XML NS Prefix in SOAP In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 when parsing XML data in SOAP extensions, overly large (>2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server.
PHP
CVE-2025-7381 Jul 09, 2025
CVE-2025-7381: PHP X-Powered-By Header Exposes PHP Version ImpactThis is an information disclosure vulnerability originating from PHP's base image. This vulnerability exposes the PHP version through an X-Powered-By header, which attackers could exploit to fingerprint the server and identify potential weaknesses. WorkaroundsThe mitigation requires changing the expose_php variable from "On" to "Off" in the file located at /usr/local/etc/php/php.ini.
PHP
CVE-2024-11235 Apr 04, 2025
UAF in PHP 8.3/8.4 via __set / ??= Operator In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.
PHP
CVE-2025-1734 Mar 30, 2025
PHP <8.1.32/8.2.28/8.3.19/8.4.5: Invalid Headers Treated as Valid In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers.
PHP
CVE-2025-1861 Mar 30, 2025
PHP 8.1-8.4 Lim. on HTTP Redirect Location Buffer (CVE-2025-1861) In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location.
PHP
CVE-2025-1736 Mar 30, 2025
PHP Header Injection via Insufficient EOL Validation (<=8.1.32, <=8.2.28, <=8.3.19, <=8.4.5) In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted.
PHP
CVE-2025-1219 Mar 30, 2025
PHP 8.1-8.4 DOM/SimpleXML Charset Header Bypass on Redirect In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations.
PHP
CVE-2025-1217 Mar 29, 2025
PHP 8.x: Incorrect HTTP Response Header Parsing (v<8.1.32/8.2.28/8.3.19/8.4.5) In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc.
PHP
CVE-2022-31631 Feb 12, 2025
PHP PDO::quote() SQLi in SQLite with too long strings (8.2.2) In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities.
PHP
CVE-2024-11233 Nov 24, 2024
PHP convert.quoted-printable-decode Filter Buffer Overread Vulnerability In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.
PHP
CVE-2024-11236 Nov 24, 2024
PHP ldap_escape() Integer Overflow Vulnerability on 32-bit Systems In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write.
PHP
CVE-2024-11234 Nov 24, 2024
PHP Stream Proxy Request Smuggling Vulnerability In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
PHP
CVE-2024-8929 Nov 22, 2024
PHP MySQL Client Heap Disclosure Vulnerability In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server.
PHP
CVE-2024-8932 Nov 22, 2024
PHP ldap_escape() Integer Overflow Vulnerability on 32-bit Systems In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write.
PHP
CVE-2024-8927 Oct 08, 2024
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirect In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
PHP
CVE-2024-8926 Oct 08, 2024
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-8925 Oct 08, 2024
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
PHP
CVE-2024-9026 Oct 08, 2024
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
PHP
CVE-2024-8925 Oct 08, 2024
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
PHP
CVE-2024-8926 Oct 08, 2024
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-8927 Oct 08, 2024
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirect In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
PHP
CVE-2024-9026 Oct 08, 2024
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
PHP
CVE-2024-8925 Oct 08, 2024
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
PHP
CVE-2024-8926 Oct 08, 2024
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-8927 Oct 08, 2024
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirect In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
PHP
CVE-2024-9026 Oct 08, 2024
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12) In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
PHP
CVE-2024-4577 Jun 09, 2024
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CP In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-4577 Jun 09, 2024
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CP In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-4577 Jun 09, 2024
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CP In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-4577 Jun 09, 2024
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CP In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-4577 Jun 09, 2024
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CP In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-4577 Jun 09, 2024
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CP In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
CVE-2024-4577 Jun 09, 2024
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CP In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.