You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type\u00a0header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations."
4202
4202
},
4203
+
"CVE-2025-1220": {
4204
+
"id": "CVE-2025-1220",
4205
+
"baseScore": null,
4206
+
"publishedDate": "2025-07-13T23:15:00+0000",
4207
+
"lastModifiedDate": "2025-07-13T23:15:00+0000",
4208
+
"description": "In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions."
4209
+
},
4203
4210
"CVE-2025-1734": {
4204
4211
"id": "CVE-2025-1734",
4205
4212
"baseScore": 5.3,
4206
4213
"publishedDate": "2025-03-30T06:15:00+0000",
4207
4214
"lastModifiedDate": "2025-07-02T20:13:00+0000",
4208
4215
"description": "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers."
4209
4216
},
4217
+
"CVE-2025-1735": {
4218
+
"id": "CVE-2025-1735",
4219
+
"baseScore": null,
4220
+
"publishedDate": "2025-07-13T23:15:00+0000",
4221
+
"lastModifiedDate": "2025-07-13T23:15:00+0000",
4222
+
"description": "In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This\u00a0could cause crashes if Postgres server rejects the string as invalid."
4223
+
},
4210
4224
"CVE-2025-1736": {
4211
4225
"id": "CVE-2025-1736",
4212
4226
"baseScore": 7.3,
@@ -4220,6 +4234,13 @@
4220
4234
"publishedDate": "2025-03-30T06:15:00+0000",
4221
4235
"lastModifiedDate": "2025-07-02T20:17:00+0000",
4222
4236
"description": "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location."
4237
+
},
4238
+
"CVE-2025-6491": {
4239
+
"id": "CVE-2025-6491",
4240
+
"baseScore": null,
4241
+
"publishedDate": "2025-07-13T22:15:00+0000",
4242
+
"lastModifiedDate": "2025-07-13T22:15:00+0000",
4243
+
"description": "In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 when parsing XML data in SOAP extensions, overly large (>2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server."
0 commit comments