Wiz Agents & Workflows are here

CVE-2023-0567
PHP vulnerability analysis and mitigation

Overview

CVE-2023-0567 affects PHP versions 8.0.X before 8.0.28, 8.1.X before 8.1.16, and 8.2.X before 8.2.3. The vulnerability exists in the password_verify() function, which may incorrectly accept some invalid Blowfish hashes as valid (NVD, Ubuntu).

Technical details

The vulnerability is caused by a PHP-specific modification to the crypt_blowfish implementation called 'PHP hack' that allows a salt cut short by $ to be detected as valid. This can trigger a buffer overread when copying the setting into the output buffer, as the memcpy uses fixed sizes even if the setting might be too short. The issue specifically affects malformatted BCrypt hashes that include a $ within their salt part (GitHub Advisory).

Impact

If an invalid hash ends up in the password database, it may lead to an application accepting any password as valid for that entry. This could potentially allow unauthorized access to affected systems if an attacker manages to inject malformed hashes into the password database (Red Hat).

Mitigation and workarounds

The vulnerability has been fixed in PHP versions 8.0.28, 8.1.16, and 8.2.3. Users should upgrade to these or later versions to address the issue. The fix involves removing the 'PHP Hack' and aligning PHP's crypt_blowfish implementation with Openwall's implementation (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-wprj-9cvc-5w37HIGH7.5
  • PHPPHP
  • wwbn/avideo
NoNoMar 29, 2026
CVE-2026-34036MEDIUM6.5
  • PHPPHP
  • dolibarr/dolibarr
NoNoMar 31, 2026
CVE-2026-33887MEDIUM5.4
  • PHPPHP
  • statamic/cms
NoYesMar 27, 2026
CVE-2026-27599MEDIUM4.7
  • PHPPHP
  • ci4-cms-erp/ci4ms
NoYesMar 30, 2026
CVE-2026-34372MEDIUMN/A
  • PHPPHP
  • sulu/sulu
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management