vulnerability
Rocky Linux: CVE-2025-1861: php-7.4 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Jul 29, 2025 | Jul 31, 2025 | Feb 13, 2026 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Jul 29, 2025
Added
Jul 31, 2025
Modified
Feb 13, 2026
Description
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location.
Solutions
rocky-upgrade-libziprocky-upgrade-libzip-debuginforocky-upgrade-libzip-debugsourcerocky-upgrade-libzip-develrocky-upgrade-libzip-toolsrocky-upgrade-libzip-tools-debuginforocky-upgrade-phprocky-upgrade-php-bcmathrocky-upgrade-php-bcmath-debuginforocky-upgrade-php-clirocky-upgrade-php-cli-debuginforocky-upgrade-php-commonrocky-upgrade-php-common-debuginforocky-upgrade-php-dbarocky-upgrade-php-dba-debuginforocky-upgrade-php-dbgrocky-upgrade-php-dbg-debuginforocky-upgrade-php-debuginforocky-upgrade-php-debugsourcerocky-upgrade-php-develrocky-upgrade-php-embeddedrocky-upgrade-php-embedded-debuginforocky-upgrade-php-enchantrocky-upgrade-php-enchant-debuginforocky-upgrade-php-ffirocky-upgrade-php-ffi-debuginforocky-upgrade-php-fpmrocky-upgrade-php-fpm-debuginforocky-upgrade-php-gdrocky-upgrade-php-gd-debuginforocky-upgrade-php-gmprocky-upgrade-php-gmp-debuginforocky-upgrade-php-intlrocky-upgrade-php-intl-debuginforocky-upgrade-php-jsonrocky-upgrade-php-json-debuginforocky-upgrade-php-ldaprocky-upgrade-php-ldap-debuginforocky-upgrade-php-mbstringrocky-upgrade-php-mbstring-debuginforocky-upgrade-php-mysqlndrocky-upgrade-php-mysqlnd-debuginforocky-upgrade-php-odbcrocky-upgrade-php-odbc-debuginforocky-upgrade-php-opcacherocky-upgrade-php-opcache-debuginforocky-upgrade-php-pdorocky-upgrade-php-pdo-debuginforocky-upgrade-php-pecl-apcurocky-upgrade-php-pecl-apcu-debuginforocky-upgrade-php-pecl-apcu-debugsourcerocky-upgrade-php-pecl-apcu-develrocky-upgrade-php-pecl-redis6rocky-upgrade-php-pecl-redis6-debuginforocky-upgrade-php-pecl-redis6-debugsourcerocky-upgrade-php-pecl-rrdrocky-upgrade-php-pecl-rrd-debuginforocky-upgrade-php-pecl-rrd-debugsourcerocky-upgrade-php-pecl-xdebugrocky-upgrade-php-pecl-xdebug-debuginforocky-upgrade-php-pecl-xdebug-debugsourcerocky-upgrade-php-pecl-xdebug3rocky-upgrade-php-pecl-xdebug3-debuginforocky-upgrade-php-pecl-xdebug3-debugsourcerocky-upgrade-php-pecl-ziprocky-upgrade-php-pecl-zip-debuginforocky-upgrade-php-pecl-zip-debugsourcerocky-upgrade-php-pgsqlrocky-upgrade-php-pgsql-debuginforocky-upgrade-php-processrocky-upgrade-php-process-debuginforocky-upgrade-php-snmprocky-upgrade-php-snmp-debuginforocky-upgrade-php-soaprocky-upgrade-php-soap-debuginforocky-upgrade-php-xmlrocky-upgrade-php-xml-debuginforocky-upgrade-php-xmlrpcrocky-upgrade-php-xmlrpc-debuginfo
References
- CVE-2025-1861
- https://attackerkb.com/topics/CVE-2025-1861
- CWE-131
- URL-https://errata.rockylinux.org/RLSA-2025:15687
- URL-https://errata.rockylinux.org/RLSA-2025:4263
- URL-https://errata.rockylinux.org/RLSA-2025:7418
- URL-https://errata.rockylinux.org/RLSA-2025:7431
- URL-https://errata.rockylinux.org/RLSA-2025:7432
- URL-https://errata.rockylinux.org/RLSA-2025:7489
- URL-https://errata.rockylinux.org/RLSA-2026:2470
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.