Php Phpgroup Php

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Phpgroup Php.

EOL Dates

Ensure that you are using a supported version of Phpgroup Php. Here are some end of life, and end of support dates for Phpgroup Php.

Release EOL End of Support Status
8.5 December 31, 2029 December 31, 2027
Active

Phpgroup Php 8.5 will become EOL in 3 years (in 2029).

8.4 December 31, 2028 December 31, 2026
Active

Phpgroup Php 8.4 will become EOL in two years (in 2028).

8.3 December 31, 2027 December 31, 2025
Active

Phpgroup Php 8.3 will become EOL next year, in December 2027.

8.2 December 31, 2026 December 31, 2024
EOL This Year

Phpgroup Php 8.2 will become EOL this year, in December 2026.

8.1 December 31, 2025 November 25, 2023
EOL

Phpgroup Php 8.1 became EOL in 2025 and supported ended in 2023

8.0 November 26, 2023 November 26, 2022
EOL

Phpgroup Php 8.0 became EOL in 2023 and supported ended in 2022

7.4 November 28, 2022 November 28, 2021
EOL

Phpgroup Php 7.4 became EOL in 2022 and supported ended in 2021

7.3 December 6, 2021 December 6, 2020
EOL

Phpgroup Php 7.3 became EOL in 2021 and supported ended in 2020

7.2 November 30, 2020 November 30, 2019
EOL

Phpgroup Php 7.2 became EOL in 2020 and supported ended in 2019

7.1 December 1, 2019 December 1, 2018
EOL

Phpgroup Php 7.1 became EOL in 2019 and supported ended in 2018

7.0 January 10, 2019 January 4, 2018
EOL

Phpgroup Php 7.0 became EOL in 2019 and supported ended in 2018

5.6 December 31, 2018 January 19, 2017
EOL

Phpgroup Php 5.6 became EOL in 2018 and supported ended in 2017

5.5 July 21, 2016 July 10, 2015
EOL

Phpgroup Php 5.5 became EOL in 2016 and supported ended in 2015

5.4 September 14, 2015 September 14, 2014
EOL

Phpgroup Php 5.4 became EOL in 2015 and supported ended in 2014

5.3 August 14, 2014 June 30, 2011
EOL

Phpgroup Php 5.3 became EOL in 2014 and supported ended in 2011

5.2 January 6, 2011 November 2, 2008
EOL

Phpgroup Php 5.2 became EOL in 2011 and supported ended in 2008

5.1 August 24, 2006 August 24, 2006
EOL

Phpgroup Php 5.1 became EOL in 2006 and supported ended in 2006

5.0 September 5, 2005 September 5, 2005
EOL

Phpgroup Php 5.0 became EOL in 2005 and supported ended in 2005

By the Year

In 2026 there have been 0 vulnerabilities in Phpgroup Php. Last year, in 2025 Php had 1 security vulnerability published. Right now, Php is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 6.50
2024 9 7.58

It may take a day or so for new Php vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Phpgroup Php Security Vulnerabilities

Heap Buffer Overflow IN PHP array_merge (8.18.5) pre 8.5.1
CVE-2025-14178 6.5 - Medium - December 27, 2025

In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.

Memory Corruption

PHP convert.quoted-printable-decode Filter Buffer Overread Vulnerability
CVE-2024-11233 4.8 - Medium - November 24, 2024

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.

Heap-based Buffer Overflow

PHP Stream Proxy Request Smuggling Vulnerability
CVE-2024-11234 4.8 - Medium - November 24, 2024

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.

Improper Input Validation

PHP ldap_escape() Integer Overflow Vulnerability on 32-bit Systems
CVE-2024-11236 9.8 - Critical - November 24, 2024

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write.

Memory Corruption

PHP MySQL Client Heap Disclosure Vulnerability
CVE-2024-8929 5.8 - Medium - November 22, 2024

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server.

Information Disclosure

PHP ldap_escape() Integer Overflow Vulnerability on 32-bit Systems
CVE-2024-8932 9.8 - Critical - November 22, 2024

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write.

Memory Corruption

PHP 8.1-8.3: Windows CGI Cmd Line Option Injection via Best-Fit CP
CVE-2024-4577 9.8 - Critical - June 09, 2024

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

Shell injection

Password_hash null byte bug in PHP <8.1.28/8.2.18/8.3.5
CVE-2024-3096 6.5 - Medium - April 29, 2024

In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.

Improper Input Validation

PHP 8.1/8.2/8.3 cmd injection via proc_open() array syntax (< v8.1.28 / < v8.2.18 / < v8.3.5)
CVE-2024-1874 9.4 - Critical - April 29, 2024

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

Output Sanitization

PHP 8.3.* DoS via mb_encode_mimeheader loop (before 8.3.5)
CVE-2024-2757 7.5 - High - April 29, 2024

In PHP 8.3.* before 8.3.5, function mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application that uses this function.

Resource Exhaustion

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Phpgroup Php or by Phpgroup? Click the Watch button to subscribe.

Phpgroup
Vendor

Phpgroup Php
Product

subscribe