EUVD-2025-19906

| CVE-2025-34061 CRITICAL
2025-07-03 [email protected]
9.3
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

3
Analysis Generated
Mar 16, 2026 - 02:12 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 02:12 euvd
EUVD-2025-19906
CVE Published
Jul 03, 2025 - 20:15 nvd
CRITICAL 9.3

Description

A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system.

Analysis

PHPStudy development environment versions 2016 through 2018 contain an embedded backdoor that executes arbitrary PHP code from HTTP request headers. The backdoor listens for base64-encoded payloads in the Accept-Charset header, decodes and executes them without any authentication, providing complete remote code execution on any server running the compromised PHPStudy.

Technical Context

PHPStudy bundles Apache+PHP+MySQL for Windows development. Versions 2016-2018 were distributed with a backdoor that intercepts every HTTP request and checks the Accept-Charset header for base64-encoded PHP code. If found, the code is decoded and executed via eval(). This affects every website hosted on the compromised PHPStudy installation.

Affected Products

['PHPStudy 2016', 'PHPStudy 2017', 'PHPStudy 2018']

Remediation

Reinstall PHPStudy from verified sources or migrate to XAMPP/WAMP. Never use PHPStudy in production. Audit servers that ran PHPStudy 2016-2018 for compromise indicators. Consider all data on affected servers as potentially exfiltrated.

Priority Score

106
Low Medium High Critical
KEV: 0
EPSS: +59.2
CVSS: +46
POC: 0

Share

EUVD-2025-19906 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy