Use-After-Free Vulnerability in PHP Products by PHP Group
CVE-2024-11235

9.2CRITICAL

Key Information:

Vendor
PHP Group
Status
Vendor
CVE Published:
4 April 2025

Summary

In PHP versions 8.3.* prior to 8.3.19 and 8.4.* prior to 8.4.5, a vulnerability exists that allows an attacker to leverage a code sequence involving the __set handler or the ??= operator together with exceptions. This can lead to a use-after-free condition due to improper handling of memory, especially if the attacker can control memory layout through specially crafted inputs. Successfully exploiting this vulnerability could allow an attacker to execute arbitrary code, posing a significant risk to the integrity and security of applications utilizing the affected PHP versions.

Affected Version(s)

PHP 8.4.* < 8.4.5

PHP 8.3.* < 8.3.19

References

CVSS V4

Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Junwha Hong
.