CVE-2024-4577

PHP Group PHP — PHP-CGI OS Command Injection Vulnerability
🔥 CVSS 3.1  9.8 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

Overview

PHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.

This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://www.php.net/ChangeLog-8.php#; https://nvd.nist.gov/vuln/detail/CVE-2024-4577

Key Details

PropertyValue
CVE ID CVE-2024-4577
Vendor / Product PHP Group — PHP
NVD Published2024-06-09
NVD Last Modified2025-11-03
CVSS 3.1 Score9.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-78
CISA KEV Added2024-06-12
CISA KEV Deadline2024-07-03
Known Ransomware Use ⚠️ Yes

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2024-07-03. Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2024-06-12Added to CISA Known Exploited Vulnerabilities catalog
2024-07-03CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2024-4577 Vulnerability Database
CISA KEV Catalog Entry US Government