vulnerability
Ubuntu: (Multiple Advisories) (CVE-2025-1217): PHP vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:S/C:N/I:P/A:N) | Mar 29, 2025 | Apr 1, 2025 | Aug 18, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
Mar 29, 2025
Added
Apr 1, 2025
Modified
Aug 18, 2025
Description
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc.
Solutions
ubuntu-pro-upgrade-libapache2-mod-php7-0ubuntu-pro-upgrade-libapache2-mod-php7-2ubuntu-pro-upgrade-libapache2-mod-php7-4ubuntu-pro-upgrade-libapache2-mod-php8-0ubuntu-pro-upgrade-libapache2-mod-php8-1ubuntu-pro-upgrade-libapache2-mod-php8-3ubuntu-pro-upgrade-libphp7-0-embedubuntu-pro-upgrade-libphp7-2-embedubuntu-pro-upgrade-php7-0-cgiubuntu-pro-upgrade-php7-0-cliubuntu-pro-upgrade-php7-0-fpmubuntu-pro-upgrade-php7-2-cgiubuntu-pro-upgrade-php7-2-cliubuntu-pro-upgrade-php7-2-fpmubuntu-pro-upgrade-php7-4ubuntu-pro-upgrade-php7-4-cgiubuntu-pro-upgrade-php7-4-cliubuntu-pro-upgrade-php7-4-fpmubuntu-pro-upgrade-php8-1ubuntu-pro-upgrade-php8-1-cgiubuntu-pro-upgrade-php8-1-cliubuntu-pro-upgrade-php8-1-fpmubuntu-pro-upgrade-php8-3ubuntu-pro-upgrade-php8-3-cgiubuntu-pro-upgrade-php8-3-cliubuntu-pro-upgrade-php8-3-fpm
References
- CVE-2025-1217
- https://attackerkb.com/topics/CVE-2025-1217
- CWE-20
- CWE-436
- UBUNTU-USN-7400-1
- UBUNTU-USN-7645-1
- URL-https://github.com/php/php-src/commit/d20b4c97a9f883b62b65b82d939c5af9a2028ef1
- URL-https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g
- URL-https://ubuntu.com/security/notices/USN-7400-1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-1217
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.