PHP Web programming language
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any PHP product.
RSS Feeds for PHP security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in PHP products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by PHP Sorted by Most Security Vulnerabilities since 2018
Recent PHP Security Advisories
| Advisory | Title | Published |
|---|---|---|
| 8.1.34 | 3 Vulnerabilities Fixed in PHP 8.1.34 | December 19, 2025 |
| 8.4.16 | 3 Vulnerabilities Fixed in PHP 8.4.16 | December 19, 2025 |
| 8.2.30 | 3 Vulnerabilities Fixed in PHP 8.2.30 | December 18, 2025 |
| 8.5.1 | 3 Vulnerabilities Fixed in PHP 8.5.1 | December 18, 2025 |
| 8.3.29 | 3 Vulnerabilities Fixed in PHP 8.3.29 | December 18, 2025 |
| 8.1.33 | 3 Vulnerabilities Fixed in PHP 8.1.33 | July 3, 2025 |
| 8.3.23 | 3 Vulnerabilities Fixed in PHP 8.3.23 | July 3, 2025 |
| 8.4.10 | 3 Vulnerabilities Fixed in PHP 8.4.10 | July 3, 2025 |
| 8.2.29 | 3 Vulnerabilities Fixed in PHP 8.2.29 | July 3, 2025 |
| 8.2.28 | 5 Vulnerabilities Fixed in PHP 8.2.28 | March 13, 2025 |
Known Exploited PHP Vulnerabilities
The following PHP vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| PHPMailer Command Injection Vulnerability |
PHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition. CVE-2016-10033 Exploit Probability: 94.5% |
July 7, 2025 |
| PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability |
In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution. CVE-2019-11043 Exploit Probability: 94.1% |
March 25, 2022 |
| PHP-CGI Query String Parameter Vulnerability |
sapi/cgi/cgi_main.c in PHP, when configured as a CGI script, does not properly handle query strings, which allows remote attackers to execute arbitrary code. CVE-2012-1823 Exploit Probability: 94.4% |
March 25, 2022 |
Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 0 vulnerabilities in PHP. Last year, in 2025 PHP had 15 security vulnerabilities published. Right now, PHP is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 15 | 4.98 |
| 2024 | 18 | 7.03 |
| 2023 | 7 | 7.09 |
| 2022 | 12 | 8.66 |
| 2021 | 8 | 6.36 |
| 2020 | 17 | 6.34 |
| 2019 | 31 | 7.75 |
| 2018 | 22 | 7.51 |
It may take a day or so for new PHP vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent PHP Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-14177 | Dec 27, 2025 |
PHP 8.x getimagesize() Info Disclosure in APPn Segments (before 8.4.16)In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server. |
|
| CVE-2025-14178 | Dec 27, 2025 |
Heap Buffer Overflow IN PHP array_merge (8.18.5) pre 8.5.1In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server. |
|
| CVE-2025-14180 | Dec 27, 2025 |
PHP 8.x PDO PgSQL Emulate Prepares Null Deref Crash (CVE-2025-14180)In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server. |
|
| CVE-2025-67899 | Dec 14, 2025 |
Uriparser <=0.9.9 Recursion Stack overflowuriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas. |
|
| CVE-2025-1220 | Jul 13, 2025 |
PHP 8.x fsockopen Null Char Validation Flaw <8.1.33/8.2.29/8.3.23/8.4.10In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions. |
|
| CVE-2025-1735 | Jul 13, 2025 |
PHP Prior 8.4.29: pgsql/PDO_PGSQL Escaping Ignores Quoting ErrorsIn PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This could cause crashes if Postgres server rejects the string as invalid. |
|
| CVE-2025-6491 | Jul 13, 2025 |
PHP<8.x: NPD via XML NS Prefix in SOAPIn PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 when parsing XML data in SOAP extensions, overly large (>2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server. |
|
| CVE-2025-7381 | Jul 09, 2025 |
CVE-2025-7381: PHP X-Powered-By Header Exposes PHP VersionImpactThis is an information disclosure vulnerability originating from PHP's base image. This vulnerability exposes the PHP version through an X-Powered-By header, which attackers could exploit to fingerprint the server and identify potential weaknesses. WorkaroundsThe mitigation requires changing the expose_php variable from "On" to "Off" in the file located at /usr/local/etc/php/php.ini. |
|
| CVE-2024-11235 | Apr 04, 2025 |
UAF in PHP 8.3/8.4 via __set / ??= OperatorIn PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??= operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution. |
|
| CVE-2025-1219 | Mar 30, 2025 |
PHP 8.1-8.4 DOM/SimpleXML Charset Header Bypass on RedirectIn PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations. |
|
| CVE-2025-1734 | Mar 30, 2025 |
PHP <8.1.32/8.2.28/8.3.19/8.4.5: Invalid Headers Treated as ValidIn PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers. |
|
| CVE-2025-1736 | Mar 30, 2025 |
PHP Header Injection via Insufficient EOL Validation (<=8.1.32, <=8.2.28, <=8.3.19, <=8.4.5)In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted. |
|
| CVE-2025-1861 | Mar 30, 2025 |
PHP 8.1-8.4 Lim. on HTTP Redirect Location Buffer (CVE-2025-1861)In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location. |
|
| CVE-2025-1217 | Mar 29, 2025 |
PHP 8.x: Incorrect HTTP Response Header Parsing (v<8.1.32/8.2.28/8.3.19/8.4.5)In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc. |
|
| CVE-2022-31631 | Feb 12, 2025 |
PHP PDO::quote() SQLi in SQLite with too long strings (8.2.2)In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities. |
|
| CVE-2024-11233 | Nov 24, 2024 |
PHP convert.quoted-printable-decode Filter Buffer Overread VulnerabilityIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas. |
|
| CVE-2024-11236 | Nov 24, 2024 |
PHP ldap_escape() Integer Overflow Vulnerability on 32-bit SystemsIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write. |
|
| CVE-2024-11234 | Nov 24, 2024 |
PHP Stream Proxy Request Smuggling VulnerabilityIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user. |
|
| CVE-2024-8929 | Nov 22, 2024 |
PHP MySQL Client Heap Disclosure VulnerabilityIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server. |
|
| CVE-2024-8932 | Nov 22, 2024 |
PHP ldap_escape() Integer Overflow Vulnerability on 32-bit SystemsIn PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write. |
|
| CVE-2024-8926 | Oct 08, 2024 |
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-8927 | Oct 08, 2024 |
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirectIn PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP. |
|
| CVE-2024-8925 | Oct 08, 2024 |
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior. |
|
| CVE-2024-9026 | Oct 08, 2024 |
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability. |
|
| CVE-2024-8927 | Oct 08, 2024 |
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirectIn PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP. |
|
| CVE-2024-8926 | Oct 08, 2024 |
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-8925 | Oct 08, 2024 |
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior. |
|
| CVE-2024-9026 | Oct 08, 2024 |
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability. |
|
| CVE-2024-8927 | Oct 08, 2024 |
Arbitrary File Inclusion in PHP 8.18.3 via cgi.force_redirectIn PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP. |
|
| CVE-2024-8926 | Oct 08, 2024 |
PHP 8.1,8.2,8.3 Cmd Injection via Windows Codepage (CVE-2024-8926)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-8925 | Oct 08, 2024 |
Multipart Parsing flaw in PHP 8.18.1.30, 8.28.2.24: Data Exclusion (CVE-2024-8925)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior. |
|
| CVE-2024-9026 | Oct 08, 2024 |
PHP-FPM Log Pollution in PHP 8.18.3 (before 8.3.12)In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-2408 | Jun 09, 2024 |
PHP OpenSSL PKCS1 PrivateDecrypt Vulnerable to Marvin Attack before 8.1.29The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable. PHP Windows builds for the versions 8.1.29, 8.2.20 and 8.3.8 and above include OpenSSL patches that fix the vulnerability. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-4577 | Jun 09, 2024 |
PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CPIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
|
| CVE-2024-5458 | Jun 09, 2024 |
PHP 8.1-8.3 FILTER_VALIDATE_URL allows invalid userinfoIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly. |
|
| CVE-2024-5585 | Jun 09, 2024 |
PHP <8.1.29/8.2.20/8.3.8 Proc_Open Cmd Inject via Trailing SpaceIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. |
|
| CVE-2024-5458 | Jun 09, 2024 |
PHP 8.1-8.3 FILTER_VALIDATE_URL allows invalid userinfoIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly. |
|
| CVE-2024-5458 | Jun 09, 2024 |
PHP 8.1-8.3 FILTER_VALIDATE_URL allows invalid userinfoIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly. |
|
| CVE-2024-5585 | Jun 09, 2024 |
PHP <8.1.29/8.2.20/8.3.8 Proc_Open Cmd Inject via Trailing SpaceIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. |
|
| CVE-2024-5585 | Jun 09, 2024 |
PHP <8.1.29/8.2.20/8.3.8 Proc_Open Cmd Inject via Trailing SpaceIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. |
|
| CVE-2024-5458 | Jun 09, 2024 |
PHP 8.1-8.3 FILTER_VALIDATE_URL allows invalid userinfoIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly. |
|
| CVE-2024-5585 | Jun 09, 2024 |
PHP <8.1.29/8.2.20/8.3.8 Proc_Open Cmd Inject via Trailing SpaceIn PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. |
|
| CVE-2024-2756 | Apr 29, 2024 |
PHP Cookie name flaw: insecure cookie treated as __Host-/__Secure-Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications. |
|
| CVE-2024-3096 | Apr 29, 2024 |
Password_hash null byte bug in PHP <8.1.28/8.2.18/8.3.5In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true. |
|