In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Php Group Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Using proc_open() string syntax avoids the problem.

History

Tue, 04 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 18:30:00 +0000


Wed, 18 Jun 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Fedoraproject
Fedoraproject fedora
Php
Php php
CPEs cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
Vendors & Products Fedoraproject
Fedoraproject fedora
Php
Php php

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Php Group
Php Group php
CPEs cpe:2.3:a:php_group:php:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php_group:php:8.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php_group:php:8.3.0:*:*:*:*:*:*:*
Vendors & Products Php Group
Php Group php
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 17:45:00 +0000

Type Values Removed Values Added
Description In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.  In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

Mon, 19 Aug 2024 08:30:00 +0000


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: php

Published:

Updated: 2025-11-04T18:22:36.621Z

Reserved: 2024-02-25T04:39:00.479Z

Link: CVE-2024-1874

cve-icon Vulnrichment

Updated: 2025-11-04T17:14:11.693Z

cve-icon NVD

Status : Modified

Published: 2024-04-29T04:15:07.580

Modified: 2025-11-04T19:16:27.900

Link: CVE-2024-1874

cve-icon Redhat

Severity :

Publid Date: 2024-04-09T00:00:00Z

Links: CVE-2024-1874 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses