In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??= operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.
References
Link | Resource |
---|---|
https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477 | Exploit Vendor Advisory |
https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477 | Exploit Vendor Advisory |
Configurations
History
30 Apr 2025, 19:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Php
Php php |
|
References | () https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477 - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
CPE | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477 - |
04 Apr 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-04 18:15
Updated : 2025-04-30 19:25
NVD link : CVE-2024-11235
Mitre link : CVE-2024-11235
CVE.ORG link : CVE-2024-11235
JSON object : View
Products Affected
php
- php
CWE
CWE-416
Use After Free