In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Published: 2024-06-07
Researchers disclose a critical severity vulnerability affecting PHP installations and provide proof-of-concept exploit code, which could lead to remote code execution.
https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html
https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/
https://security.netapp.com/advisory/ntap-20240621-0008/
https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately
https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html
https://blog.talosintelligence.com/patch-it-up-old-vulnerabilities-are-everyones-problems/
https://thehackernews.com/2025/03/cisa-adds-five-actively-exploited.html
https://www.greynoise.io/blog/mass-exploitation-critical-php-cgi-vulnerability-cve-2024-457
https://therecord.media/bug-affecting-php-scripts-global-issue
https://thehackernews.com/2025/03/php-cgi-rce-flaw-exploited-in-attacks.html
https://blog.talosintelligence.com/new-persistent-attacks-japan/
https://devco.re/blog/2025/01/09/worstfit-unveiling-hidden-transformers-in-windows-ansi/
https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/
https://thehackernews.com/2025/01/mirai-botnet-variant-exploits-four.html
https://hackread.com/androxgh0st-botnet-iot-devices-exploit-vulnerabilities/
https://securelist.com/exploits-and-vulnerabilities-q3-2024/114839/
https://securelist.com/vulnerability-exploit-report-q2-2024/113455/
https://thehackernews.com/2024/08/hackers-exploit-php-vulnerability-to.html
https://symantec-enterprise-blogs.security.com/threat-intelligence/taiwan-malware-dns
https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure
https://www.php.net/ChangeLog-8.php#8.3.8
https://www.php.net/ChangeLog-8.php#8.2.20
https://www.php.net/ChangeLog-8.php#8.1.29
https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/
https://isc.sans.edu/diary/30994
https://github.com/xcanwin/CVE-2024-4577-PHP-RCE
https://github.com/watchtowrlabs/CVE-2024-4577
https://github.com/rapid7/metasploit-framework/pull/19247
https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv
Published: 2024-06-09
Updated: 2025-03-28
Named Vulnerability: WorstFitKnown Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94376
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest