EUVD-2025-21274

| CVE-2025-1220 LOW
2025-07-13 [email protected]
3.7
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

5
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21274
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
PoC Detected
Nov 04, 2025 - 22:16 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 23:15 nvd
LOW 3.7

Description

In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.

Analysis

In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.

Technical Context

Server-Side Request Forgery allows an attacker to induce the server to make HTTP requests to arbitrary destinations, including internal services. This vulnerability is classified as Server-Side Request Forgery (SSRF) (CWE-918).

Affected Products

Affected products: Php Php

Remediation

Validate and whitelist allowed URLs and IP ranges. Block requests to internal/private IP ranges. Use network segmentation to limit server-side request scope.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +18
POC: +20

Vendor Status

Debian

php7.4
Release Status Fixed Version Urgency
bullseye fixed 7.4.33-1+deb11u9 -
bullseye (security) fixed 7.4.33-1+deb11u10 -
(unstable) fixed (unfixed) -
php8.2
Release Status Fixed Version Urgency
bookworm fixed 8.2.29-1~deb12u1 -
bookworm (security) fixed 8.2.30-1~deb12u1 -
(unstable) fixed (unfixed) -
php8.4
Release Status Fixed Version Urgency
trixie fixed 8.4.11-1 -
trixie (security) fixed 8.4.16-1~deb13u1 -
forky, sid fixed 8.4.16-1 -
(unstable) fixed 8.4.10-1 -

Share

EUVD-2025-21274 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy